@dblp

Usable Security Management for Network Access Rules of Critical Infrastructure.

, , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 432-447. Springer, (2017)

Links and resources

Tags