Rights statement: This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 110, 2021 DOI: 10.1016/j.cose.2021.102424
Accepted author manuscript, 427 KB, PDF document
Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Article number | 102424 |
---|---|
<mark>Journal publication date</mark> | 30/11/2021 |
<mark>Journal</mark> | Computers and Security |
Volume | 110 |
Number of pages | 19 |
Publication Status | Published |
Early online date | 8/08/21 |
<mark>Original language</mark> | English |