Elsevier, Computers and Security, (79), p. 117-131, 2018
DOI: 10.1016/j.cose.2018.08.005
Export citation
Search in Google Scholar
Full text: Unavailable