Modules to compose an automated production machine of infusion sets
The information content from lending relationships across the supply chain
Identifying and obfuscating security vulnerabilities and behaviors in IoT
The economic value of personal information. Revised title: The vulnerability of pe...
Specialist System for Detection and Diagnosis of Leakage in Water Supply Urban Net...