Cyber Potential Metaphorical Map Method Based on GMap

datacite.relatedItem.firstPage46
datacite.relatedItem.issue2
datacite.relatedItem.relatedIdentifierTypeISSN
datacite.relatedItem.relatedItemIdentifier2220-9964
datacite.relatedItem.relationTypeIsPublishedIn
datacite.relatedItem.titleIJGI
datacite.relatedItem.volume14
dc.contributor.authorDongyu Si
dc.contributor.authorBingchuan Jiang
dc.contributor.authorQing Xia
dc.contributor.authorTingting Li
dc.contributor.authorXiao Wang
dc.contributor.authorJingxu Liu
dc.date.accessioned2025-05-14T16:59:38Z
dc.date.available2025-05-14T16:59:38Z
dc.date.issued2025
dc.identifier.doihttps://doi.org/10.3390/ijgi14020046
dc.identifier.otherjz000158-0011
dc.identifier.urihttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/32688
dc.publisherMDPI AG
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subject.ddc550
dc.titleCyber Potential Metaphorical Map Method Based on GMap
dc.typeArticle
dcat.distribution.pdfhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/32689
dcat.distribution.supplierxmlhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/32690
dspace.entity.typeDataset
relation.isDistributionOfDataset08fc5883-dd0d-484a-8888-eb9b6e08fcc7
relation.isDistributionOfDatasetf680b90a-1f01-437f-ab19-2f0437fd63f7
relation.isDistributionOfDatasetffcaad4d-e219-45a6-b2fd-f00bede932b8
relation.isDistributionOfDataset.latestForDiscovery08fc5883-dd0d-484a-8888-eb9b6e08fcc7
wdm.archivematicaaipuuid.originala43ee6c6-b3a2-4bcd-b315-015530fe0048

Files

Collections