Login / Signup

Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems.

Mustafa AydinJeremy L. Jacob
Published in: EISIC (2015)
Keyphrases