Rights statement: This is the author’s version of a work that was accepted for publication in Journal of Information Security and Applications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Journal of Information Security and Applications, 59, 2021 DOI: 10.1016/j.jisa.2021.102810
Accepted author manuscript, 1.53 MB, PDF document
Available under license: CC BY-NC-ND
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
<mark>Journal publication date</mark> | 30/06/2021 |
---|---|
<mark>Journal</mark> | Journal of Information Security and Applications |
Volume | 59 |
Publication Status | Published |
Early online date | 21/03/21 |
<mark>Original language</mark> | English |