Login / Signup

Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.

Sohail SafdarMohd Fadzil HassanRehan AkbarMuhammad Aasim Qureshi
Published in: ICWCA (2012)
Keyphrases