Login / Signup

Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.

Mudassar AslamChristian GehrmannMats Björkman
Published in: SIN (2013)
Keyphrases