Search
ComputingReviews.com
Should researchers use data from security breaches?
Douglas D. Communications of the ACM62(12):22-24,2019.Type:Article
Published By:
ACM Press
Use your personal or institutional subscription to read the
fulltext of the article.
You can purchase an article without having a subscription.
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud, Inc.
®
Terms of Use
|
Privacy Policy