Login / Signup

A similarity-based M(1, 2, 3) approach for rating the security of network systems.

Junhu RuanYan ShiTakashi Samatsu
Published in: SCIS&ISIS (2014)
Keyphrases