.

Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare

LAUR Repository

Files in this item

This item appears in the following Collection(s)

Search LAUR


Advanced Search

Browse

My Account