Springer, Journal of Hardware and Systems Security, 3(1), p. 203-218, 2017
DOI: 10.1007/s41635-017-0021-2
Export citation
Search in Google Scholar
Full text: Download