Skip to content
TUM Library
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporarily saved: 0 temporarily saved (Full)
  • Help
    • Contact
    • Search Tips
    • Interlibary loan info
  • Chat
  • Tools
    • Search History
    • Open Interlibary Loan
    • Recommend a Purchase
  • Deutsch
  • Account

    Account

    • Borrowed Items
    • Requested Items
    • Fees
    • Profile
    • Search History
  • Log Out
  • Login
  • Books & Journals
  • Papers
Advanced
  • Secure Fusion Estimation and C...
  • Cite this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
    • Export to BibTeX
    • Export to RIS
  • Add to favorites
  • Save temporarily Remove from Book Bag
  • Permalink
Export Ready — 
Cover Image
Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks:
Saved in:
Bibliographic Details
Main Authors: Chen, Bo (Author), Li, Tongxiang (Author), Zhang, Wen-An (Author), Yu, Li (Author)
Format: Electronic eBook
Language:English
Published: Singapore Springer Nature Singapore 2025
Singapore Springer
Edition:1st ed. 2025
Subjects:
Communications Engineering, Networks
Cyber-Physical Systems
Mobile and Network Security
Telecommunication
Cooperating objects (Computer systems)
Computer networks / Security measures
Links:https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
https://doi.org/10.1007/978-981-97-9396-9
Physical Description:1 Online-Ressource (XII, 173 p. 54 illus., 43 illus. in color)
ISBN:9789819793969
DOI:10.1007/978-981-97-9396-9
Staff View

MARC

LEADER 00000nam a2200000zc 4500
001 BV050151142
003 DE-604
007 cr|uuu---uuuuu
008 250204s2025 xx o|||| 00||| eng d
020 |a 9789819793969  |c Online  |9 978-981-9793-96-9 
024 7 |a 10.1007/978-981-97-9396-9  |2 doi 
035 |a (ZDB-2-ENG)9789819793969 
035 |a (OCoLC)1498793161 
035 |a (DE-599)BVBBV050151142 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-M347  |a DE-634  |a DE-92  |a DE-898  |a DE-29  |a DE-706  |a DE-1043  |a DE-859  |a DE-862  |a DE-861  |a DE-573  |a DE-860  |a DE-863  |a DE-1050  |a DE-523  |a DE-91  |a DE-1046  |a DE-Aug4 
082 0 |a 621.382  |2 23 
084 |a ELT 000  |2 stub 
084 |a MAS 000  |2 stub 
100 1 |a Chen, Bo  |e Verfasser  |4 aut 
245 1 0 |a Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks  |c by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu 
250 |a 1st ed. 2025 
264 1 |a Singapore  |b Springer Nature Singapore  |c 2025 
264 1 |a Singapore  |b Springer 
300 |a 1 Online-Ressource (XII, 173 p. 54 illus., 43 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Communications Engineering, Networks 
650 4 |a Cyber-Physical Systems 
650 4 |a Mobile and Network Security 
650 4 |a Telecommunication 
650 4 |a Cooperating objects (Computer systems) 
650 4 |a Computer networks / Security measures 
700 1 |a Li, Tongxiang  |4 aut 
700 1 |a Zhang, Wen-An  |4 aut 
700 1 |a Yu, Li  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9793-95-2 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9793-97-6 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9793-98-3 
856 4 0 |u https://doi.org/10.1007/978-981-97-9396-9  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-ENG 
940 1 |q ZDB-2-ENG_2025 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035487473 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-634  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-1043  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-1046  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-Aug4  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-1050  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-573  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-M347  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-92  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-898  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-859  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-860  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-861  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-863  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-862  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-523  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-91  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-706  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-9396-9  |l DE-29  |p ZDB-2-ENG  |x Verlag  |3 Volltext 

Record in the Search Index

DE-BY-OTHR_katkey 7057091
_version_ 1831256111926214656
adam_text
any_adam_object
author Chen, Bo
Li, Tongxiang
Zhang, Wen-An
Yu, Li
author_facet Chen, Bo
Li, Tongxiang
Zhang, Wen-An
Yu, Li
author_role aut
aut
aut
aut
author_sort Chen, Bo
author_variant b c bc
t l tl
w a z waz
l y ly
building Verbundindex
bvnumber BV050151142
classification_tum ELT 000
MAS 000
collection ZDB-2-ENG
ctrlnum (ZDB-2-ENG)9789819793969
(OCoLC)1498793161
(DE-599)BVBBV050151142
dewey-full 621.382
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 621 - Applied physics
dewey-raw 621.382
dewey-search 621.382
dewey-sort 3621.382
dewey-tens 620 - Engineering and allied operations
discipline Maschinenbau / Maschinenwesen
Elektrotechnik / Elektronik / Nachrichtentechnik
doi_str_mv 10.1007/978-981-97-9396-9
edition 1st ed. 2025
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050151142</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250204s2025 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819793969</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9793-96-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-9396-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)9789819793969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1498793161</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050151142</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Bo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks</subfield><subfield code="c">by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2025</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2025</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 173 p. 54 illus., 43 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber-Physical Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cooperating objects (Computer systems)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Tongxiang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Wen-An</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Li</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9793-95-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9793-97-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9793-98-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2025</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035487473</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-9396-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV050151142
illustrated Not Illustrated
indexdate 2025-03-20T19:08:58Z
institution BVB
isbn 9789819793969
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035487473
oclc_num 1498793161
open_access_boolean
owner DE-M347
DE-634
DE-92
DE-898
DE-BY-UBR
DE-29
DE-706
DE-1043
DE-859
DE-862
DE-BY-FWS
DE-861
DE-573
DE-860
DE-863
DE-BY-FWS
DE-1050
DE-523
DE-91
DE-BY-TUM
DE-1046
DE-Aug4
owner_facet DE-M347
DE-634
DE-92
DE-898
DE-BY-UBR
DE-29
DE-706
DE-1043
DE-859
DE-862
DE-BY-FWS
DE-861
DE-573
DE-860
DE-863
DE-BY-FWS
DE-1050
DE-523
DE-91
DE-BY-TUM
DE-1046
DE-Aug4
physical 1 Online-Ressource (XII, 173 p. 54 illus., 43 illus. in color)
psigel ZDB-2-ENG
ZDB-2-ENG_2025
publishDate 2025
publishDateSearch 2025
publishDateSort 2025
publisher Springer Nature Singapore
Springer
record_format marc
spellingShingle Chen, Bo
Li, Tongxiang
Zhang, Wen-An
Yu, Li
Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
Communications Engineering, Networks
Cyber-Physical Systems
Mobile and Network Security
Telecommunication
Cooperating objects (Computer systems)
Computer networks / Security measures
title Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
title_auth Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
title_exact_search Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
title_full Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu
title_fullStr Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu
title_full_unstemmed Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu
title_short Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks
title_sort secure fusion estimation and control for cyber physical systems under malicious attacks
topic Communications Engineering, Networks
Cyber-Physical Systems
Mobile and Network Security
Telecommunication
Cooperating objects (Computer systems)
Computer networks / Security measures
topic_facet Communications Engineering, Networks
Cyber-Physical Systems
Mobile and Network Security
Telecommunication
Cooperating objects (Computer systems)
Computer networks / Security measures
url https://doi.org/10.1007/978-981-97-9396-9
work_keys_str_mv AT chenbo securefusionestimationandcontrolforcyberphysicalsystemsundermaliciousattacks
AT litongxiang securefusionestimationandcontrolforcyberphysicalsystemsundermaliciousattacks
AT zhangwenan securefusionestimationandcontrolforcyberphysicalsystemsundermaliciousattacks
AT yuli securefusionestimationandcontrolforcyberphysicalsystemsundermaliciousattacks
  • Availability
Order (Login required)
Read online
  • Legal Notice
  • Data Privacy
  • Accessibility Statement
  • First Level Hotline