Login / Signup

Misconfigurations discovery between distributed security components using the mobile agent approach.

Fakher Ben FtimaKamel KarouiHenda Ben Ghézala
Published in: iiWAS (2009)
Keyphrases