Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Strategic programs for advanced research and technology in Europe

CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.

Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .

Livrables

Final release of demonstration

The effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.

Demonstrators evaluation

This deliverable provides the demonstration of the three verticals described in T5.4. It is supported by an evaluation document.

Training evaluation pilot

This deliverable will contain recommendations from trainees toward improvements in the training that will take place at involved universities and professional training facilities in the form of hands-on training. Recommendations will be written down during pilot tests of the trainings, basing on thematic analysis of trainees experiences. Pilot evaluation will be done through in-depth interviews and focus groups.

Final results of the clustering, platforms, and ecosystems activities

This deliverable presents the results of all the WP8 tasks in M36.

Cybersecurity threat intelligence common data model

This will be the design and specification for the data model agreed as common standard to be used for cybersecurity threat intelligence, as well practical implementation of ENISA proposed cyber-incidents data model.

Initial results of the clustering, platforms, and ecosystems activities

This deliverable presents the results of all the WP8 tasks in M12.

Intermediate results of the clustering, platforms, and ecosystems activities

This deliverable presents the results of all the WP8 tasks in M24.

Pilot of cyber training & exercise framework (Ct&eF)

An infrastructure for technical realization of training activities at multiple consortium partners.

Visual analytics system for cybersecurity threat analysis

This will be a suitable visualization techniques and integrated Visual Analytics components based on available data and analysis models, as well as human computer interaction methods based on the Visual Analytics enabled visual interfaces.

First release of demonstration

The effectiveness of the technical results achieved in T6.1-5 is demonstrated by their application in a Smart Polygeneration Microgrid and in a Smart Energy Building It is supported by an evaluation document.

SPARTA SRIA lessons learned and future assessment

In this report the SPARTA roadmap committee will document both its lessons learned during the roadmap creation process as well as a future assessment of ways to enhance the roadmap generation and maintenance process

Demonstrators specifications

This deliverable provides the specifications of the demonstrators coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks

From assessing to supporting the future CCN

This deliverable i reports how SPARTA governance have improved from the beginning and ii details the recommendations made for the future CCN

International and national cybersecurity certification initiatives - Updates

Update of D111

Preparing a CCN pilot to become a sustainable CCN

This deliverable i reports how external recommendations have been implemented and ii explains how SPARTA has been prepared to be become a sustainable CCN

Updated SPARTA SRIA (roadmap v1)

Release of an updated version of the SPARTA Roadmap.

Commercial deployment plan

This deliverable is a report exploring ways to promote results from SPARTA for commercial deployment all project partners will beneficiate

Updated SPARTA SRIA (roadmap v2)

Release of an updated version of the SPARTA Roadmap

Updated SPARTA SRIA (roadmap v3)

Release of an updated version of the SPARTA Roadmap

Second internal ELSA audit and supervision report

D24 reports on the work and results from the ELSA audit and supervision done throughout the 2nd yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request

Updated dissemination and communication plan and evaluation - v2

This report provides is an update to D123

International and national cybersecurity certification initiatives

This deliverable will be a mapping of cybersecurity initiatives.

Sustainable exploitation documents

D105 is a set of promotion and sectoralfocused documentations aimed at supporting project results all project partners will beneficiate

Updated dissemination and communication plan and evaluation – v1

This report provides is an update to D12.1.

Workplace integration evaluation report

This deliverable evaluates the outcome of the cybersecurity skills framework and training evaluation pilot with both alumni and human resources departments of employment institutions It provides feedback on the appropriateness of the framework and training programs

Initial SPARTA SRIA (roadmap v0.1)

Release of an initial version of the SPARTA Roadmap.

Pre-existing components identification documentation

This deliverable is a set of templates and assisting documentations ensuring an adequate common tracking of pre-existing resources used within the project; all project partners will beneficiate.

Lessons learned from internally assessing a CCN pilot

This deliverable (i) reports how SPARTA governance have been internally assessed and (ii) details the recommendations made.

Report on liaison with national cybersecurity authorities

This deliverable will report on the liaison activities with national cybersecurity authorities throughout SPARTA life

First internal ELSA audit and supervision report

D2.2 reports on the work and results from the ELSA audit and supervision done throughout the 1st year.

Security-by-design framework for the intelligent infrastructure

This deliverable aggregates contributions from T615 and describes the roadmap and specification of the five tasks describing the objectives of each team as well as the roadmap to achieve integration

Ethical, legal, and societal aspects

This deliverable provides a documented list of relevant ethical, legal and societal aspects relevant in the context of large-scale cybersecurity research and innovation.

Final report on dissemination and communication and evaluation - v3

This report provides is an update to D124

Bootstrapping a CCN pilot

This deliverable (i) reports about how governance, R&D&I, community and exploitation activities have been organized to launch SPARTA and (ii) discusses new findings and replicability the structures.

Cybersecurity evaluation facilities

This deliverable will report on the cybersecurity evaluation facilities activities from T113 provided by SPARTA partners

Cybersecurity skills framework

The framework will contain collection and description of all relevant skills – covering a skill catalogue, roles, skills & knowls (knowledge items) definitions and skill levels; as well implementation in online skill administration portal.

Dissemination and communication plan, updates, and evaluation

This report provides the initial dissemination and communication plan in M03, which will be updated yearly, jointly with an evaluation of the dissemination and communication work carried out.

Cybersecurity threat prediction legal framework

This will be a report on the outcomes of all legal debates challenges legal aspects analysis and assessment as well recommendation for further cybersecurity policy and regulation development

Lessons learned from externally assessing a CCN pilot

This deliverable i reports how SPARTA governance have been externally assessed and ii details the recommendations made

Demonstrator prototypes

This deliverable provides prototypes coming out of T54 They include contributions on integration mechanisms coming out of the three other tasks

Final internal ELSA audit and supervision report

This deliverable reports on the work and results from the ELSA audit and supervision done throughout the third yearAs the public status of the ELSA audit deliverable might influence the replies given by partners during audits more detailed results CO will be made available to the EC upon request

Project quality plan

The project quality plan (the project handbook) constitutes a set of project templates, explanations on the project management process, review process, quality checks, meeting organisation, which is communicated to all partners.

Improving a CCN pilot

This deliverable i reports how internal recommendations have been implemented and ii how SPARTA activities have improved in consequence

Validation and evaluation plan

This deliverable will specify the initial plan data and procedures for testing and evaluation

AI systems threat analysis mechanisms and tools

The threat and risks analysis for AI systems will be reported in this document

Key challenges and promising solution approaches

This deliverable provides a map of key challenges and related promising or good practices focusing on a limited set of ethical legal and societal aspects

Project results description documentation

This will be a set of templates and assisting documentations ensuring an adequate common identification of produced resources. It will include result of legal source code audit (if applicable); all project partners will beneficiate.

Final version of AI systems security mechanisms and tools

This deliverable will describe the final version of the created defensive and reactive mechanisms explainability enhancing mechanisms and fairness ensuring mechanisms The results of AI Program contests will be provided

Closing the gender and diversity gap

Final report on the activities and impact of the actions carried out related to gender and diversity issues

Cybersecurity compliant development processes

This deliverable will report findings on process oriented certification concepts for complex mainstream commercial software systems.

Assessment specifications and roadmap

This deliverable aggregates contributions from T5.1, T5.2 and T5.3 to describes the roadmap and specification of the three tasks, describing the objectives of each team, as well as the roadmap to completing integration into T5.4.

Preliminary description of AI systems security mechanisms and tools

This deliverable will present the first version of the defensive and reactive mechanisms, explainability enhancing mechanisms and fairness ensuring mechanisms. The information about the AI Program contests will be provided.

Outermost regions engagement

Final report describing the activities and impact of the Go Cyber with SPARTA campaign

Cybersecurity threat prediction framework

This deliverable will provide the definition of approach methods to be used and process organization to provide comprehensive prediction of fullspectrum cybersecurity threat

Concrete ELSA solutions for the SPARTA programs

This deliverable reports on the specifics of implementing selected ELSA solutions in the four SPARTA Programs

Validation and evaluation report

This document will provide details and results of the conducted evaluation and validation

Curricula descriptions

D9.2, which is the outcome of T9.2 and T9.3, will contain the complete curricula for both university and professional training programs, in particular the set of recommended courses, laboratory activities, workshops and exercises. The curricula will serve as the best-practice resource for training on all levels of study programs intended for wide audience, including students, citizens and professionals to get the skills identified in D9.1.

General guidelines for responsible cybersecurity research and innovation

This deliverable lists general suggestions relevant in the context of responsible and legally compliant cybersecurity research and innovation

Sustainability and exploitation plan

This deliverable is a report explaining the modalities of project results’ exploitation and licensing, including a common IPR framework; all project partners will beneficiate.

Security enhanced OS software

Results will be showcased as open source implementations and then integrated with mainstream OS, such as RIOT.

Internal and external IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the SPARTA project to external target groups including conferences, marketing measures and communication channels. Furthermore, this deliverable constitutes the launch of the internal SPARTA communication infrastructure including the establishment of mailing lists, a subversion repository server and the SPARTA website.

Publications

Big Data Analytics for Intrusion Detection - An Overview

Auteurs: Luis Filipe Dias, Miguel Correia
Publié dans: Handbook of Research on Machine and Deep Learning Applications for Cyber Security, 2020, Page(s) 292-316, ISBN 9781522596110
Éditeur: IGI Global
DOI: 10.4018/978-1-5225-9611-0.ch014

Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review

Auteurs: Abasi-Amefon O. Affia, Raimundas Matulevičius, Alexander Nolte
Publié dans: On the Move to Meaningful Internet Systems: OTM 2019 Conferences - Confederated International Conferences: CoopIS, ODBASE, C&TC 2019, Rhodes, Greece, October 21–25, 2019, Proceedings, Numéro 11877, 2019, Page(s) 282-300, ISBN 978-3-030-33245-7
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-33246-4_18

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service

Auteurs: Qiang Tang
Publié dans: Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers, Numéro 12020, 2020, Page(s) 199-207, ISBN 978-3-030-42920-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-42921-8_11

On the Impact of Network Data Balancing in Cybersecurity Applications

Auteurs: Marek Pawlicki, Michał Choraś, Rafał Kozik, Witold Hołubowicz
Publié dans: Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Numéro 12140, 2020, Page(s) 196-210, ISBN 978-3-030-50422-9
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-50423-6_15

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards

Auteurs: Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
Publié dans: ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Numéro 562, 2019, Page(s) 286-298, ISBN 978-3-030-22311-3
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-22312-0_20

Visual Analytics for Cyber Security Domain: State-of-the-Art and Challenges

Auteurs: Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius, Vaidas Jukavičius
Publié dans: Information and Software Technologies - 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings, Numéro 1078, 2019, Page(s) 256-270, ISBN 978-3-030-30274-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-30275-7_20

A Privacy-Enhancing Framework for Internet of Things Services

Auteurs: Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
Publié dans: Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Numéro 11928, 2019, Page(s) 77-97, ISBN 978-3-030-36937-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-36938-5_5

Machine Learning – The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?

Auteurs: Michał Choraś, Marek Pawlicki, Damian Puchalski, Rafał Kozik
Publié dans: Computational Science – ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3–5, 2020, Proceedings, Part IV, Numéro 12140, 2020, Page(s) 615-628, ISBN 978-3-030-50422-9
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-50423-6_46

Experimental Analysis of the Laser-Induced Instruction Skip Fault Model

Auteurs: Jean-Max Dutertre, Timothé Riom, Olivier Potin, Jean-Baptiste Rigaud
Publié dans: Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings, Numéro 11875, 2019, Page(s) 221-237, ISBN 978-3-030-35054-3
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-35055-0_14

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain

Auteurs: Michał Choraś, Marek Pawlicki, Rafał Kozik
Publié dans: Intelligent Data Engineering and Automated Learning – IDEAL 2019 - 20th International Conference, Manchester, UK, November 14–16, 2019, Proceedings, Part II, Numéro 11872, 2019, Page(s) 353-360, ISBN 978-3-030-33616-5
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-33617-2_36

OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms

Auteurs: Luís Dias, Hélder Reia, Rui Neves, Miguel Correia
Publié dans: Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings, Numéro 11928, 2019, Page(s) 199-220, ISBN 978-3-030-36937-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-36938-5_12

Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium

Auteurs: Christophe Ponsard, Jeremy Grandclaudon, Nicolas Point
Publié dans: Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020, Page(s) 754-759, ISBN 978-989-758-399-5
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009190307540759

Saving private addresses - an analysis of privacy issues in the bluetooth-low-energy advertising mechanism

Auteurs: Guillaume Celosia, Mathieu Cunche
Publié dans: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019, Page(s) 444-453, ISBN 9781450372831
Éditeur: ACM
DOI: 10.1145/3360774.3360777

On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering

Auteurs: Antoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Carlan
Publié dans: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 346-353, ISBN 978-1-7281-5138-0
Éditeur: IEEE
DOI: 10.1109/issrew.2019.00095

CFI: Control Flow Integrity or Control Flow Interruption?

Auteurs: Nicolo Maunero, Paolo Prinetto, Gianluca Roascio
Publié dans: 2019 IEEE East-West Design & Test Symposium (EWDTS), 2019, Page(s) 1-6, ISBN 978-1-7281-1003-5
Éditeur: IEEE
DOI: 10.1109/ewdts.2019.8884464

Towards Formal Methods of IoT Application Layer Protocols

Auteurs: Katharina Hofer-Schmitz, Branka Stojanovic
Publié dans: 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019, Page(s) 1-6, ISBN 978-1-7281-2856-6
Éditeur: IEEE
DOI: 10.1109/cmi48017.2019.8962139

TSNSCHED: Automated Schedule Generation for Time Sensitive Networking

Auteurs: Aellison Cassimiro T. dos Santos, Ben Schneider, Vivek Nigam
Publié dans: 2019 Formal Methods in Computer Aided Design (FMCAD), 2019, Page(s) 69-77, ISBN 978-0-9835678-9-9
Éditeur: IEEE
DOI: 10.23919/fmcad.2019.8894249

ModelSpeX: Model Specification Using Explainable Artificial Intelligence Methods

Auteurs: Schlegel, Udo and Cakmak, Eren and Keim, Daniel A
Publié dans: International Workshop on Machine Learning in Visualisation for Big Data: MLVis 2020, 2020
Éditeur: Eurographics Association
DOI: 10.2312/mlvis.20201100

Formal Security Verification of Industry 4.0 Applications

Auteurs: Vivek Nigam, Carolyn Talcott
Publié dans: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, Page(s) 1043-1050, ISBN 978-1-7281-0303-7
Éditeur: IEEE
DOI: 10.1109/etfa.2019.8869428

xMP: Selective Memory Protection for Kernel and User Space

Auteurs: Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis
Publié dans: 2020 IEEE Symposium on Security and Privacy (SP), 2020, Page(s) 563-577, ISBN 978-1-7281-3497-0
Éditeur: IEEE
DOI: 10.1109/sp40000.2020.00041

Automated Security Analysis of IoT Software Updates

Auteurs: Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo
Publié dans: 2019
Éditeur: 13th International Conference on Information Security Theory and Practice

Advances in Usability of Formal Methods for Code Verification with Frama-C

Auteurs: André Maroneze, Valentin Perrelle, Florent Kirchner
Publié dans: 2019
Éditeur: Electronic Communications of the EASST
DOI: 10.14279/tuj.eceasst.77.1108.1053

A Secure Publish/Subscribe Protocol for Internet of Things

Auteurs: Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
Publié dans: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-10, ISBN 9781450371643
Éditeur: ACM Press
DOI: 10.1145/3339252.3340503

Foreshadow-VMM: Feasibility and Network Perspective

Auteurs: Marco Spaziani Brunella, Giuseppe Bianchi, Sara Turco, Francesco Quaglia, Nicola Blefari-Melazzi
Publié dans: 2019 IEEE Conference on Network Softwarization (NetSoft), 2019, Page(s) 257-259, ISBN 978-1-5386-9376-6
Éditeur: IEEE
DOI: 10.1109/netsoft.2019.8806712

MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps

Auteurs: Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé Bissyandé, Jacques Klein
Publié dans: Proceedings of The Web Conference 2020, 2020, Page(s) 1715-1726, ISBN 9781450370233
Éditeur: ACM
DOI: 10.1145/3366423.3380242

Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile

Auteurs: Guillaume Celosia, Mathieu Cunche
Publié dans: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things - IoT S&P'19, 2019, Page(s) 24-31, ISBN 9781450368384
Éditeur: ACM Press
DOI: 10.1145/3338507.3358617

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors

Auteurs: Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Muhlberg, Frank Piessens
Publié dans: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Page(s) 262-276, ISBN 978-1-7281-6572-1
Éditeur: IEEE
DOI: 10.1109/csf49147.2020.00026

WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs

Auteurs: Andrea Valenza, Luca Demetrio, Gabriele Costa, Giovanni Lagorio
Publié dans: SoftwareX, Numéro 11, 2020, Page(s) 100367, ISSN 2352-7110
Éditeur: ELSEVIER
DOI: 10.1016/j.softx.2019.100367

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

Auteurs: Hannes Tschofenig, Emmanuel Baccelli
Publié dans: IEEE Security & Privacy, Numéro 17/5, 2019, Page(s) 47-57, ISSN 1540-7993
Éditeur: IEEE Computer Society
DOI: 10.1109/msec.2019.2923973

LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection

Auteurs: Robertas Damasevicius, Algimantas Venckauskas, Sarunas Grigaliunas, Jevgenijus Toldinas, Nerijus Morkevicius, Tautvydas Aleliunas, Paulius Smuikys
Publié dans: Electronics, Numéro 9/5, 2020, Page(s) 800, ISSN 2079-9292
Éditeur: Basel : MDPI AG.
DOI: 10.3390/electronics9050800

Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols

Auteurs: Guillaume Celosia, Mathieu Cunche
Publié dans: Proceedings on Privacy Enhancing Technologies, Numéro 2020/1, 2020, Page(s) 26-46, ISSN 2299-0984
Éditeur: Sciendo
DOI: 10.2478/popets-2020-0003

Defending network intrusion detection systems against adversarial evasion attacks

Auteurs: Marek Pawlicki, Michał Choraś, Rafał Kozik
Publié dans: Future Generation Computer Systems, Numéro 110, 2020, Page(s) 148-154, ISSN 0167-739X
Éditeur: Elsevier BV
DOI: 10.1016/j.future.2020.04.013

Natural Projection as Partial Model Checking

Auteurs: Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David Basin & Chiara Bodei
Publié dans: Journal of Automated Reasoning, 2020, ISSN 1573-0670
Éditeur: Springer

A survey on multi-factor authentication for online banking in the wild

Auteurs: Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone
Publié dans: Computers & Security, Numéro 95, 2020, Page(s) 101745, ISSN 0167-4048
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101745

Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check

Auteurs: Koen Zandberg, Kaspar Schleiser, Francisco Acosta, Hannes Tschofenig, Emmanuel Baccelli
Publié dans: IEEE Access, Numéro 7, 2019, Page(s) 71907-71920, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2919760

Privacy-Preserving Contact Tracing: current solutions and open questions

Auteurs: Qiang Tang
Publié dans: 2020
Éditeur: arXiv

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible