Supporting security sensitive architecture design

  • Babar M
  • Wang X
  • Gorton I
  • 12

    Readers

    Mendeley users who have this article in their library.
  • 0

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free