Using ontologies to perform threat analysis and develop defensive strategies for mobile security
Crossref DOI link: https://doi.org/10.1007/s10799-014-0213-1
Published Online: 2015-01-07
Published Print: 2017-03
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wang, Ping
Chao, Kuo-Ming
Lo, Chi-Chun
Wang, Yu-Shih
Text and Data Mining valid from 2015-01-07