Login / Signup

A quantitative and knowledge-based approach to choosing security architectural tactics.

Suntae Kim
Published in: Int. J. Ad Hoc Ubiquitous Comput. (2015)
Keyphrases