Login / Signup

Heuristics for evaluating IT security management tools.

Pooya JaferianKirstie HawkeyAndreas SotirakopoulosMaria Velez-RojasKonstantin Beznosov
Published in: SOUPS (2011)
Keyphrases