It looks like you're offline.
Open Library logo
additional options menu
Last edited by ImportBot
June 7, 2020 | History

Quanyan Zhu

We need a photo of Quanyan Zhu

12 works Add another?

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Resource Management for on-Demand Mission-Critical Internet of Things Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Game Theory and Machine Learning for Cyber Security

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Security and Resilience of Control Systems: Theory and Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Game Theory for Cyber Deception: From Theory to Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Industrial Control Systems Security and Resiliency: Practice and Theory

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber-Security Threats and Response Models in Nuclear Power Plants

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: IoT Supply Chain Security Risk Analysis and Mitigation: Modeling, Computations, and Software Tools

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cognitive Security: A System-Scientific Approach

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
We need a photo of Quanyan Zhu

Lists

ID Numbers

Links outside Open Library

No links yet. Add one?

History

Download catalog record: RDF / JSON
June 7, 2020 Created by ImportBot import new book