Article,

Providing security on demand using invasive computing.

, , , , , , , , , and .
it - Information Technology, 58 (6): 281-295 (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews