


default search action
"Using ontologies to perform threat analysis and develop defensive ..."
Ping Wang et al. (2017)
- Ping Wang, Kuo-Ming Chao
, Chi-Chun Lo, Yu-Shih Wang:
Using ontologies to perform threat analysis and develop defensive strategies for mobile security. Inf. Technol. Manag. 18(1): 1-25 (2017)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.