Return to Article Details
A stochastic model of the security system's functional behavior for a critical infrastructure object
Download
Download PDF