Login / Signup
Stealthy Protocols: Metrics and Open Problems.
Olga Chen
Catherine A. Meadows
Gautam Trivedi
Published in:
Concurrency, Security, and Puzzles (2017)
Keyphrases
</>
open problems
database theory
long standing
multidatabase transaction management
evaluation metrics
security protocols
computational advertising
neural network
management system
computational intelligence
communication protocols