You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
Generating a Real-Time Constraint Engine for Network Protocols
|
---|---|
Chapter number | 5 |
Book title |
Information Security Theory and Practice
|
Published by |
Springer, Cham, December 2018
|
DOI | 10.1007/978-3-030-20074-9_5 |
Book ISBNs |
978-3-03-020073-2, 978-3-03-020074-9
|
Authors |
Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean, Rakha, Mohamed Sami, Imam, Fahim T., Dean, Thomas R. |
Mendeley readers
The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 4 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Unspecified | 1 | 25% |
Unknown | 3 | 75% |
Readers by discipline | Count | As % |
---|---|---|
Unspecified | 1 | 25% |
Unknown | 3 | 75% |