Large result sets may take several minutes to download.
The first row is header row.
Generation of CSV export files is restricted, and may be rejected during busy periods. If this happens then please wait and try again after a brief interval.
Dong X
(2008)
Threat Modelling in User Performed Authentication
in Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings