Login / Signup

How to exchange security events? Overview and evaluation of formats and protocols.

Jessica SteinbergerAnna SperottoMario GollingHarald Baier
Published in: IM (2015)
Keyphrases