Publication
2013 International Conference on Information and Network Security (ICINS 2013)
Record type
Proceedings article
Published
2013
DOI

The publisher of this work supports multiple resolution. The work is available from the following locations:

debug {'doi': '10.1049/cp.2013.2454', 'member_id': '265', 'member': 'Institution of Engineering and Technology', 'container-title': '2013 International Conference on Information and Network Security (ICINS 2013)', 'primary-resource': 'https://digital-library.theiet.org/content/conferences/10.1049/cp.2013.2454', 'tld': 'theiet.org', 'clearbit-logo': 'https://logo.clearbit.com/theiet.org', 'coaccess': [], 'multiple-resolution': [{'url': 'http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6826003', 'tld': 'ieee.org', 'clearbit-logo': 'https://logo.clearbit.com/ieee.org'}], 'type': 'PROCEEDINGS ARTICLE', 'published_date': '2013', 'publication': '2013 International Conference on Information and Network Security (ICINS 2013)', 'title': 'Dynamically validate network security based on adaptive control theory', 'name': None, 'id': None, 'location': None, 'display_doi': 'https://doi.org/10.1049/cp.2013.2454', 'grant_info': None, 'grant_info_funders': None, 'grant_info_funder_ids': '', 'grant_info_type': None, 'multiple_lead_investigators': [], 'multiple_co_lead_investigators': [], 'multiple_investigators': [], 'finances': [], 'project_description': None, 'award_amount': None, 'award_start': None, 'funding_scheme': None, 'internal_award_number': None, 'editors': None, 'authors': None, 'chairs': None, 'supplementary_ids': None}
https://doi.org/10.1049/cp.2013.2454
JSON
XML