T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)Wei Peng,Feng Li,Keesook J Han,Xukai Zou,Jie Wumag(2013)引用 23|浏览5暂无评分关键词policies,information security,information systems,computer security,mobile computingAI 理解论文溯源树样例生成溯源树,研究论文发展脉络Chat Paper正在生成论文摘要