End-to-End Database Software Security

datacite.relatedItem.firstPage163
datacite.relatedItem.issue2
datacite.relatedItem.relatedIdentifierTypeISSN
datacite.relatedItem.relatedItemIdentifier2674-113X
datacite.relatedItem.relationTypeIsPublishedIn
datacite.relatedItem.titleSoftware
datacite.relatedItem.volume2
dc.contributor.authorDenis Ulybyshev
dc.contributor.authorMichael Rogers
dc.contributor.authorVadim Kholodilo
dc.contributor.authorBradley Northern
dc.date.accessioned2024-08-14T11:13:59Z
dc.date.available2024-08-14T11:13:59Z
dc.date.issued2023
dc.identifier.doihttps://doi.org/10.3390/software2020007
dc.identifier.otherjz000087-0009
dc.identifier.urihttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3678
dc.publisherMDPI AG
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subject.ddc004
dc.titleEnd-to-End Database Software Security
dc.typeArticle
dcat.distribution.pdfhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3679
dcat.distribution.supplierxmlhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3680
dspace.entity.typeDataset
relation.isDistributionOfDataset993da9f7-8418-4c48-85fa-2a1905855b15
relation.isDistributionOfDatasetce4619ce-34e7-422b-b72f-4f19dd02f1c6
relation.isDistributionOfDataset6b441796-c7be-4f00-afde-7ffcd480be75
relation.isDistributionOfDataset.latestForDiscovery993da9f7-8418-4c48-85fa-2a1905855b15
wdm.archivematicaaipuuid.originalcebf5019-3348-4a28-8fb6-0f729c55a790

Files

Collections