Vol-3155⫷ Vol-3156 ⫸Vol-3157
urn:nbn:de:0074-3156-0


Vol-3156/paper22⫷Vol-3156/paper23⫸Vol-3156/paper24

Information technologies of active control of complex hierarchical systems under threats and information attacks