Computing the value of security | IET Conference Publication | IEEE Xplore