Drei gute Gründe für V-to-X-Security
Crossref DOI link: https://doi.org/10.1007/s35778-018-0026-7
Published Online: 2018-08-17
Published Print: 2018-08
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wollinger, Thomas
Text and Data Mining valid from 2018-08-01
Article History
First Online: 17 August 2018