Enterprise security investment through time when facing different types of vulnerabilities
Crossref DOI link: https://doi.org/10.1007/s10796-017-9745-3
Published Online: 2017-03-17
Published Print: 2019-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Miaoui, Yosra
Boudriga, Noureddine
Text and Data Mining valid from 2017-03-17
Article History
First Online: 17 March 2017