Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/31045
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLu, Wei-
dc.contributor.authorWen, Qiaoyan-
dc.contributor.authorZhang, Yuqing-
dc.contributor.authorLang, Bo-
dc.contributor.authorWen, Weiping-
dc.contributor.authorYan, Hanbing-
dc.contributor.authorLi, Chao-
dc.contributor.authorDing, Li-
dc.contributor.authorLi, Ruiguang-
dc.contributor.authorZhou, Yu-
dc.date.accessioned2023-04-17T12:19:53Z-
dc.date.available2023-04-17T12:19:53Z-
dc.date.issued2021-
dc.identifier.citationhttps://doi.org/10.1007/978-981-33-4922-3en_US
dc.identifier.isbn978-981-33-4922-3-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/31045-
dc.language.isoenen_US
dc.publisherSpringer Singaporeen_US
dc.titleCyber Securityen_US
dc.typeBooken_US
Appears in Collections:0.1 Data Processing & Computer Science

Files in This Item:
File Description SizeFormat 
Cyber Security (3).pdf344.08 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.