Vol-3199⫷ Vol-3200 ⫸Vol-3201
urn:nbn:de:0074-3200-0


Vol-3200/paper30⫷Vol-3200/paper31⫸Vol-3200/paper32

Example of Differential Transformations Application in Cybersecurity