Return to Article Details
Method of vulnerabilities analysis of socio-technical systems to the social engineering influences
Download
Download PDF