IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kieras, Timothy (VerfasserIn), Farooq, Junaid (VerfasserIn), Zhu, Quanyan (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing 2022
Cham Springer
Ausgabe:1st ed. 2022
Schriftenreihe:SpringerBriefs in Computer Science
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-824
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV048496222
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 221004s2022 xx o|||| 00||| eng d
020 |a 9783031084805  |c Online  |9 978-3-031-08480-5 
024 7 |a 10.1007/978-3-031-08480-5  |2 doi 
035 |a (ZDB-2-SCS)9783031084805 
035 |a (OCoLC)1347222409 
035 |a (DE-599)BVBBV048496222 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-824  |a DE-384  |a DE-M347  |a DE-573  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
100 1 |a Kieras, Timothy  |e Verfasser  |4 aut 
245 1 0 |a IoT Supply Chain Security Risk Analysis and Mitigation  |b Modeling, Computations, and Software Tools  |c by Timothy Kieras, Junaid Farooq, Quanyan Zhu 
250 |a 1st ed. 2022 
264 1 |a Cham  |b Springer International Publishing  |c 2022 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (XVI, 129 p. 65 illus., 58 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a SpringerBriefs in Computer Science  |x 2191-5776 
650 4 |a Data and Information Security 
650 4 |a Cyber-Physical Systems 
650 4 |a Risk Management 
650 4 |a Data protection 
650 4 |a Cooperating objects (Computer systems) 
650 4 |a Financial risk management 
700 1 |a Farooq, Junaid  |4 aut 
700 1 |a Zhu, Quanyan  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-08479-9 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-08481-2 
856 4 0 |u https://doi.org/10.1007/978-3-031-08480-5  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2022 
943 1 |a oai:aleph.bib-bvb.de:BVB01-033873577 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-1050  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-898  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-863  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-862  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-523  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-384  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-824  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-08480-5  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBR_katkey 6614773
_version_ 1822673878544023552
any_adam_object
author Kieras, Timothy
Farooq, Junaid
Zhu, Quanyan
author_facet Kieras, Timothy
Farooq, Junaid
Zhu, Quanyan
author_role aut
aut
aut
author_sort Kieras, Timothy
author_variant t k tk
j f jf
q z qz
building Verbundindex
bvnumber BV048496222
classification_tum DAT 000
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)9783031084805
(OCoLC)1347222409
(DE-599)BVBBV048496222
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-031-08480-5
edition 1st ed. 2022
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04130nam a2200769zcb4500</leader><controlfield tag="001">BV048496222</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221004s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031084805</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-08480-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-08480-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031084805</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1347222409</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048496222</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kieras, Timothy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IoT Supply Chain Security Risk Analysis and Mitigation</subfield><subfield code="b">Modeling, Computations, and Software Tools</subfield><subfield code="c">by Timothy Kieras, Junaid Farooq, Quanyan Zhu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 129 p. 65 illus., 58 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5776</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber-Physical Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cooperating objects (Computer systems)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial risk management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Farooq, Junaid</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Quanyan</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-08479-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-08481-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033873577</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-08480-5</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV048496222
illustrated Not Illustrated
indexdate 2024-12-24T09:33:25Z
institution BVB
isbn 9783031084805
issn 2191-5776
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-033873577
oclc_num 1347222409
open_access_boolean
owner DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
owner_facet DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XVI, 129 p. 65 illus., 58 illus. in color)
psigel ZDB-2-SCS
ZDB-2-SCS_2022
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Springer International Publishing
Springer
record_format marc
series2 SpringerBriefs in Computer Science
spellingShingle Kieras, Timothy
Farooq, Junaid
Zhu, Quanyan
IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools
Data and Information Security
Cyber-Physical Systems
Risk Management
Data protection
Cooperating objects (Computer systems)
Financial risk management
title IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools
title_auth IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools
title_exact_search IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools
title_full IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools by Timothy Kieras, Junaid Farooq, Quanyan Zhu
title_fullStr IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools by Timothy Kieras, Junaid Farooq, Quanyan Zhu
title_full_unstemmed IoT Supply Chain Security Risk Analysis and Mitigation Modeling, Computations, and Software Tools by Timothy Kieras, Junaid Farooq, Quanyan Zhu
title_short IoT Supply Chain Security Risk Analysis and Mitigation
title_sort iot supply chain security risk analysis and mitigation modeling computations and software tools
title_sub Modeling, Computations, and Software Tools
topic Data and Information Security
Cyber-Physical Systems
Risk Management
Data protection
Cooperating objects (Computer systems)
Financial risk management
topic_facet Data and Information Security
Cyber-Physical Systems
Risk Management
Data protection
Cooperating objects (Computer systems)
Financial risk management
url https://doi.org/10.1007/978-3-031-08480-5
work_keys_str_mv AT kierastimothy iotsupplychainsecurityriskanalysisandmitigationmodelingcomputationsandsoftwaretools
AT farooqjunaid iotsupplychainsecurityriskanalysisandmitigationmodelingcomputationsandsoftwaretools
AT zhuquanyan iotsupplychainsecurityriskanalysisandmitigationmodelingcomputationsandsoftwaretools