Добірка наукової літератури з теми "Secur"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secur".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Secur"

1

Zivanovic, Irena, Jacek Kociszewski, Jakob Eberhard, and Volker Viereck. "Bladder perforation after TVT-Secur™ procedure: how secure is TVT-Secur™?" Archives of Gynecology and Obstetrics 289, no. 1 (2013): 131–34. http://dx.doi.org/10.1007/s00404-013-2968-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Incavo, Stephen J., Bruce D. Beynnon, and Kathryn M. Coughlin. "Total Hip Arthroplasty with the Secur-Fit and Secur-Fit Plus Femoral Stem Design." Journal of Arthroplasty 23, no. 5 (2008): 670–76. http://dx.doi.org/10.1016/j.arth.2007.05.044.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hota, Lekha S., Katherine Hanaway, Michele R. Hacker, et al. "TVT-Secur (Hammock) Versus TVT-Obturator." Female Pelvic Medicine & Reconstructive Surgery 18, no. 1 (2012): 39–43. http://dx.doi.org/10.1097/spv.0b013e31823bdbcf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Molden, Stephanie M., and Vincent R. Lucente. "New minimally invasive slings: TVT Secur." Current Urology Reports 9, no. 5 (2008): 358–61. http://dx.doi.org/10.1007/s11934-008-0062-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Uddain, Jasim. "Enhancing food safety and security through organic agriculture and innovative fertilizer management." Asian-Australasian Journal of Food Safety and Security 8, no. 2 (2024): 27–31. http://dx.doi.org/10.3329/aajfss.v8i2.74060.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kabir, SM Lutful. "Nourishing minds and bodies: the imperative of food safety and security." Asian-Australasian Journal of Food Safety and Security 8, no. 1 (2024): 1–4. http://dx.doi.org/10.3329/aajfss.v8i1.71842.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Neogi, Sucharit Basu. "Addressing the climate-food-health nexus: strengthening ecosystem-based adaptation and One Health." Asian-Australasian Journal of Food Safety and Security 9, no. 1 (2025): 1–4. https://doi.org/10.3329/aajfss.v9i1.79031.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Richard, Patrick, Louis-Olivier Gagnon, and Le Mai Tu. "“U-Method” TVT-Secur Slings: Are they obstructive?" Canadian Urological Association Journal 6, no. 2 (2012): 104–7. http://dx.doi.org/10.5489/cuaj.11124.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hale, John, and Paul Brusil. "Secur(e/ity) Management: A Continuing Uphill Climb." Journal of Network and Systems Management 15, no. 4 (2007): 525–53. http://dx.doi.org/10.1007/s10922-007-9079-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Khandwala, Salil, and Chaandini Jayachandran. "TVT-Secur in Office Sling Procedure Under Local Anesthesia." Female Pelvic Medicine & Reconstructive Surgery 18, no. 4 (2012): 233–38. http://dx.doi.org/10.1097/spv.0b013e318259f6b2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Secur"

1

Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.<br>Ramachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Neubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Belostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.

Повний текст джерела
Анотація:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaves 51-52).<br>by Eugene B. Belostotsky.<br>M.Eng.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.

Повний текст джерела
Анотація:
<p>Software protection is increasingly necessary for a number of applications, ranging from commercial systems and digital content distributors, to military systems exposed in the field of operations. As computing devices become more pervasive, and software more complex, insufficiencies with current software protection mechanisms have arisen. Software--only and data--only protection systems have resulted in broken systems that are vulnerable to loss of software confidentiality and integrity. </p><p> A growing number of researchers have suggested that hardware encryption mechanisms be employe
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Tanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.

Повний текст джерела
Анотація:
Past few decades witnessed the birth and explosive growth of the internet and the communications &ndash<br>most notably the electronic mail- through it. Studies indicate that although security measures are deployed, their usage is very limited and problematic. This work proposes a system to address some of the shortcomings of present mail security systems, such as underutilization, complicated key management and unwanted immunization against filtering-scanning. A two-layer message encryption scheme with domain level keys is introduced and a performance analysis is presented. An analysis of the
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Muhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.

Повний текст джерела
Анотація:
The need for and requests for utilization of wireless equipment are growing rapidly. Advantages of using wireless communication are easy to realize. Having access to electronically stored information no matter where you are is a big advantage. Furthermore, wireless communication is increasingly utilized in everyday work and there is a constant development of new wireless equipment. Today, utilization of wireless communication is very practical as well as effective. On the other hand, using wireless equipment and communication entails risk unless efforts are made to secure this communication. S
Стилі APA, Harvard, Vancouver, ISO та ін.
7

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Повний текст джерела
Анотація:
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Повний текст джерела
Анотація:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outl
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Volaco, Gustavo Capobiano. "Viver ou secar?" reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/23548.

Повний текст джерела
Анотація:
Resumo: Este trabalho está escrito para demonstrar que aquilo que paralisa Fabiano, Vitória e seus filhos, não é tanto, como a crítica canônica tem insistido, mero efeito de relações econômicas desiguais ou fruto de um ambiente inóspito que subjuga aqueles o habitam. Seus conflitos, antes de se constituírem como sociais, são gerados e alimentados pelas palavras naquilo que elas tem de mais próprio, ou seja, por mais esforço que façamos, elas insistem em não selar um sentido unívoco, um destino traçado ou uma vida mais natural. Seu caráter protéico não permite facilmente um assentamento do ser
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.

Повний текст джерела
Анотація:
In todays heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Platforms that support such computation on image processing purposes are called secure image processing protocols. In this thesis, we propose a new security model, called quasi information theoretic (QIT) security. Under the proposed model efficient protocols on two basic image processing algorithms linear filtering and thresholding are developed. For both problems we consider two situations: 1) only tw
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Secur"

1

Laird, Robbin F. Britain's security policy: The Modern Soviet view. Alliance for the Institute for European Defence & Strategic Studies, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Donnelly, C. N. Nations, alliances and security: A collection of writings. Akadémiai Kiadó, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mima, Cataldo, ed. The Women's encampment for a future of peace and justice: Images and writings. Temple University Press, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Laere, Frederik Lucien de. Secuur. Poeziecentrum V.Z.W., 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Baumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hegarty, Cain. Suffolk's defended shore: Coastal fortifications from the air. English Heritage, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Leader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Barker, Harold. Secure forever. Loizeaux Bros., 1986.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lange, James. Retire Secure! John Wiley & Sons, Ltd., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Samalin, Samuel. Secure UNIX. McGraw-Hill, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Secur"

1

Sakamuri, Lokesh, Sai Chandana Thiruvuru, Rohit Gupta Kunala, et al. "Optimum Transportation Scheme for Healthcare Supply Chain Management." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. "Introduction." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ali, Gauhar, Mohammed El-Affendi, and Ahmed A. Abd El-Latif. "Securing Digital Health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sahid, Abdelkebir. "Securing Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Yassine, Maleh, and Taqafi Issam. "Securing the Future of E-health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jafar, Uzma, and Hafiz Adnan Hussain. "Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zainuddin, Ahmad Anwar, Muhammad Hazrin Fahmi bin Abd Halim, Nur Syafika Bahrudin, Aida Shahiedun, Nik Muhammd Faris Firdaus bin Norazman, and Muhammad Falikh Fikri bin Mohd Fauzi. "IoT Application, Privacy, and Security in Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hammad, Mohamed. "Biometric Security and Access Management in E-health Services." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Do, Phuc Hao, Thanh Liem Tran, Van Dai Pham, Abdelhamied A. Ateya, and Tran Duc Le. "Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hughes, Vera, and David Weller. "Secure." In People in Retailing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-09897-2_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Secur"

1

Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.

Повний текст джерела
Анотація:
The demand for cloud-based deep learning has intensified the need for secure computation. Our quantum-secure deep learning protocol leverages quantum properties of light and telecommunication components for scalable, secure cloud-based deep learning in optical networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Nath, Sumon, Agustin Navarro-Torres, Alberto Ros, and Biswabandan Panda. "Secure Prefetching for Secure Cache Systems." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00017.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rezaei, Tahereh, Chitra Vadlamani, Amir Kalev, and Jonathan L. Habif. "Quantum Pulse Position Modulation using Entangled States for Communication Security." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jw2a.86.

Повний текст джерела
Анотація:
Introducing Quantum Pulse Position Modulation (QPPM): an entanglement-based, secure pulse position modulation approach using two-mode entangled light and ther-mal noise for stealthy data transmission. Quantum bounds ensure secure symbol decoding, baffling eavesdroppers.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Meng, Xuanqi, Jiarun Zhou, Xiulong Liu, Xinyu Tong, Wenyu Qu, and Jianrong Wang. "Secur-Fi: A Secure Wireless Sensing System Based on Commercial Wi-Fi Devices." In IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. IEEE, 2023. http://dx.doi.org/10.1109/infocom53939.2023.10229055.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ovilla-Martinez, Brisbane, and Lilian Bossuet. "Restoration protocol: Lightweight and secur devices authentication based on PUF." In 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 2017. http://dx.doi.org/10.1109/vlsi-soc.2017.8203460.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Steger, Marco, Carlo Boano, Michael Karner, Joachim Hillebrand, Werner Rom, and Kay Romer. "SecUp: Secure and Efficient Wireless Software Updates for Vehicles." In 2016 Euromicro Conference on Digital System Design (DSD). IEEE, 2016. http://dx.doi.org/10.1109/dsd.2016.11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wang, Chao, Wen Yu Kon, Hong Jie Ng, and Charles C. W. Lim. "Experimental symmetric private information retrieval with measurement-device-independent quantum network." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.ff1a.3.

Повний текст джерела
Анотація:
We report the first realisation of a provably-secure symmetric private information retrieval (SPIR) scheme supported by a quantum-secure key-exchange network, offering secure retrieval of fingerprint data from a database with 800 entries.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.

Повний текст джерела
Анотація:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of a
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Felcan, Miroslav. "Historical Cross-Section of Arson." In Safe and Secure Society. The College of European and Regional Studies, 2020. http://dx.doi.org/10.36682/ssc_2020/1.

Повний текст джерела
Анотація:
This work was supported by the Agency for Research and Development under the contract no. APVV-17-0217.Every year fires cause big damage to society, property, environment, buildings and infrastructure and pose a threat to life and health of persons in endangered areas. In most cases arson serves as insurance fraud or cover up any crime (e.g. robbery, embezzlement). However, there may be other reasons, e.g. in the case of the Commission of the European Union, the use of the product in envy, hatred, threats, blackmail, competitive struggle. Or social, political, or ethnic differences. In several
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Secur"

1

Nelson, Cynthia Lee. Secure portal. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921125.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Dunigan, T. H., and N. Venugopal. Secure PVM. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/406053.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Krishnan, S., J. Laganier, M. Bonola, and A. Garcia-Martinez. Secure Proxy ND Support for SEcure Neighbor Discovery (SEND). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6496.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Archer, M., D. A. Frincke, and K. Levitt. Secure resource management: Specifying and testing secure operating systems. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6023693.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Shands, Deborah. Secure Virtual Enclaves. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402350.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Luu, Brian B. Secure Link Middleware. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada485508.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501670.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Aderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Storage Architectures. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1195819.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada636498.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Gibbs, P. W. Secure Transportation Management. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1160060.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!