@dblp

Identitying vulnerabilities and controls in complex composite security architectures.

. University of Aberdeen, UK, (2014)British Library, EThOS.

Links and resources

Tags