Login / Signup

A simulation model of IS security.

Norman PendegraftMark RoundsDeborah A. Frincke
Published in: ACM Southeast Regional Conference (2) (2005)
Keyphrases