The application of useless japanese inventions for requirements elicitation in information security

This source preferred by Shamal Faily

Authors: Partridge, A. and Faily, S.

http://eprints.bournemouth.ac.uk/23840/

Start date: 11 July 2016

The data on this page was last updated at 04:43 on November 23, 2017.