The application of useless japanese inventions for requirements elicitation in information security

This source preferred by Shamal Faily

Authors: Partridge, A. and Faily, S.

http://eprints.bournemouth.ac.uk/23840/

Start date: 11 July 2016

The data on this page was last updated at 04:42 on September 24, 2017.