

Publisher: IGI Global_journal
E-ISSN: 1947-3044|2|1|40-83
ISSN: 1947-3036
Source: International Journal of Secure Software Engineering (IJSSE), Vol.2, Iss.1, 2011-01, pp. : 40-83
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Rudall B.H.
Kybernetes: The International Journal of Systems & Cybernetics, Vol. 33, Iss. 8, 2004-08 ,pp. :



