"Heuristics for Evaluating IT Security Management Tools."

Pooya Jaferian et al. (2014)

Details and statistics

DOI: 10.1080/07370024.2013.819198

access: closed

type: Journal Article

metadata version: 2023-08-28