Using ontologies to perform threat analysis and develop defensive strategies for mobile security

P. Wang, K-M Chao, Chichun Lo, Y-S. Wang

    Research output: Contribution to journalArticle

    13 Citations (Scopus)

    Fingerprint

    Dive into the research topics of 'Using ontologies to perform threat analysis and develop defensive strategies for mobile security'. Together they form a unique fingerprint.

    Computer Science