Inproceedings,

T-dominance: Prioritized defense deployment for BYOD security.

, , , , and .
CNS, page 37-45. IEEE, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews