Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/ict-eurasia/KuangLZ13
%A Kuang, Xiaohui
%A Li, Xiang
%A Zhao, Jinjing
%B ICT-EurAsia
%D 2013
%E Mustofa, Khabib
%E Neuhold, Erich J.
%E Tjoa, A Min
%E Weippl, Edgar R.
%E You, Ilsun
%I Springer
%K dblp
%P 479-484
%T Architecture of Network Environment for High-Risk Security Experimentation.
%U http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2013.html#KuangLZ13
%V 7804
%@ 978-3-642-36817-2
@inproceedings{conf/ict-eurasia/KuangLZ13,
added-at = {2022-01-13T00:00:00.000+0100},
author = {Kuang, Xiaohui and Li, Xiang and Zhao, Jinjing},
biburl = {https://www.bibsonomy.org/bibtex/2f9b797d5188c2e761af3fef8fbeef784/dblp},
booktitle = {ICT-EurAsia},
crossref = {conf/ict-eurasia/2013},
editor = {Mustofa, Khabib and Neuhold, Erich J. and Tjoa, A Min and Weippl, Edgar R. and You, Ilsun},
ee = {https://doi.org/10.1007/978-3-642-36818-9_53},
interhash = {9bb1fcc3f6c06cc0d61735943c3686d4},
intrahash = {f9b797d5188c2e761af3fef8fbeef784},
isbn = {978-3-642-36817-2},
keywords = {dblp},
pages = {479-484},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T07:11:36.000+0200},
title = {Architecture of Network Environment for High-Risk Security Experimentation.},
url = {http://dblp.uni-trier.de/db/conf/ict-eurasia/ict-eurasia2013.html#KuangLZ13},
volume = 7804,
year = 2013
}