![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Stobińska Magdalena
Publisher: Springer Publishing Company
ISSN: 1230-1612
Source: Open Systems and Information Dynamics, Vol.14, Iss.1, 2007-03, pp. : 81-90
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
The Charleston Advisor, Vol. 9, Iss. 4, 2008-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Gogoi Prasanta Bhattacharyya Dhruba K. Kalita Jugal K.
International Journal of Security and Networks, Vol. 8, Iss. 2, 2013-08 ,pp. :