Optimizing Information Systems Security Design Based on Existing Security Knowledge
Keyword(s):
2015 ◽
Vol 17
(2)
◽
pp. 74-92
Keyword(s):
Keyword(s):