par Austa, Cédrick
;Mühlberg, Jan Tobias
;Dricot, Jean-Michel 
Référence 10th International Conference on Information Systems Security and Privacy(26-28 February, 2024: Rome, Italy), SciTePress, Vol. 1, page (725-732)
Publication Publié, 2024-02-01



Référence 10th International Conference on Information Systems Security and Privacy(26-28 February, 2024: Rome, Italy), SciTePress, Vol. 1, page (725-732)
Publication Publié, 2024-02-01
Publication dans des actes
Fichier(s) déposé(s) par l'encodeur |