Sign in

-based and use case-based security modelling initiatives.

Olawande J. DaramolaYushan PanPéter KárpátiGuttorm Sindre
Published in: RCIS (2012)
Keyphrases