Maintaining results from security assessments | IEEE Conference Publication | IEEE Xplore