Abstract: In this paper, we consider the verification of the hypothesis in the research of computer incidents study, based on the analysis of attributes and their values with post-incident computer ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results