Show simple item record

dc.date.accessioned2021-04-21T02:00:59Z
dc.date.available2021-04-21T02:00:59Z
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/67929
dc.typepublisher
oapen.relation.isPublisherOf4efe2f0a-8a38-4be0-9d58-11362bdfd557
oapen.relation.isPublisherOf6db22c68-1264-427e-8cbc-ec9a7aa593c9
oapen.relation.isPublisherOf29217039-2f2e-4213-be91-a332cc4108f1
oapen.relation.isPublisherOf2b5e3526-b768-49d9-a26a-a792d79f2856
oapen.relation.isPublisherOf096ae4cc-48fd-41f7-baf1-1b82a10863b0
oapen.relation.isPublisherOf4d0382a5-7d43-4bea-971d-7233aa728134
oapen.relation.isPublisherOfebf1b2e1-1de8-46f0-9985-3bcf406b15ed
oapen.relation.isPublisherOf4f3da7cb-e985-4468-94b5-cd4c47f4d8f3
oapen.relation.isPublisherOf5f51e717-3b39-4342-832f-b6102fee0356
oapen.relation.isPublisherOfdafcce25-11c3-4fb4-9464-7e119f7de597
oapen.relation.isPublisherOf01b34891-546a-48de-9cc5-16120e1fcdde
oapen.relation.isPublisherOf9fdcb226-93eb-449f-babd-816c704de3cf
oapen.relation.isPublisherOfbfe2a5ae-2d72-45c9-9703-4828ba1145d2
oapen.relation.isPublisherOf3033167d-57d5-4917-8939-0f2329d0c563
oapen.relation.isPublisherOf94cd0df2-994f-4842-88e9-a9990d6082d5
oapen.relation.isPublisherOf5e425d8e-04dc-4e02-98b8-2ab656483569
oapen.relation.isPublisherOf214bfbba-00e2-4715-8ab1-0e9dede4e564
oapen.relation.isPublisherOf591c986c-945b-4476-bf54-396c87ad0212
oapen.relation.isPublisherOf6ccc0b37-1b9e-424b-80b0-0ea61b5d5675
oapen.relation.isPublisherOfae62347b-acb7-45cc-8c6a-540f29a08158
publisher.nameNow Publishers


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Publications

  • Suh, Changho (2023)
    Information theory deals with mathematical laws that govern the flow, representation and transmission of information. The most significant achievement of the field is the invention of digital communication which forms the ...
  • Soldatos, John; Philpot, James; Giunta, Gabriele (2020)
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing ...
  • Soldatos, John (2020)
    In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies ...

See more