Designing security scenarios for capturing suspicious activities - yes it's possible. presented at Confidence 2016

by Krzysztof Cudak,

Summary : N/A