SKRM: Where security techniques talk to each other | IEEE Conference Publication | IEEE Xplore