Login / Signup

Using Proven Reference Monitor Patterns for Security Evaluation.

Mark R. HeckmanRoger R. Schell
Published in: Inf. (2016)
Keyphrases