• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Using ontologies to perform threat analysis and develop defensive strategies for mobile security.

Ping WangKuo-Ming ChaoChi-Chun LoYu-Shih Wang
Published in: Inf. Technol. Manag. (2017)
Keyphrases