Login / Signup

Using ontologies to perform threat analysis and develop defensive strategies for mobile security.

Ping WangKuo-Ming ChaoChi-Chun LoYu-Shih Wang
Published in: Inf. Technol. Manag. (2017)
Keyphrases