

Author: Diakakis Ioannis
Publisher: Edp Sciences
E-ISSN: 2261-236x|41|issue|05004-05004
ISSN: 2261-236x
Source: MATEC Web of conference, Vol.41, Iss.issue, 2016-02, pp. : 05004-05004
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Network model of security system
MATEC Web of conference, Vol. 76, Iss. issue, 2016-10 ,pp. :





