Original Research
Published on 03 Aug 2015
Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios
in Computer Security
Frontiers in ICT
doi 10.3389/fict.2015.00011
- 5,707 views
- 1 citation