Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Mobile cyber-assurance informed through knowledge graph construction: the OWASP threat of insecure communications
Suzanna Schmeelk; Lixin Tao
International Journal of Internet of Things and Cyber-Assurance (IJITCA), 2020 Vol.1 No.3/4, pp.317 - 337
12 + 11 =

Thank you for your feedback.