Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Comparing security vulnerability by operating system environment
Dongkyun Seo; Kyungho Lee
International Journal of Services Technology and Management (IJSTM), 2017 Vol.23 No.1/2, pp.154 - 164
18 + 1 =

Thank you for your feedback.