T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)

mag(2013)

引用 23|浏览5
暂无评分
关键词
policies,information security,information systems,computer security,mobile computing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要