Use of GIS data to model the vulnerability of the emergency system to attacks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publication2013 Proceedings of IEEE Southeastcon
Pages1–6
StatePublished - 2013

Cite this