Author: Lazzarotti Valentina
Publisher: Inderscience Publishers
ISSN: 1740-2832
Source: International Journal of Technology Intelligence and Planning, Vol.9, Iss.1, 2013-03, pp. : 37-56
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Malware Attacks: Why, When and How?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :
SourceOECD Science & Information Technology, Vol. 2006, Iss. 1, 2006-04 ,pp. :
By Candido Guido Muzio Kaminski Paulo Carlos
International Journal of Automotive Technology and Management, Vol. 8, Iss. 3, 2008-09 ,pp. :