The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: -
Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.
Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.
Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.