Login / Signup
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks.
Frank Yeong-Sung Lin
Po-Hao Tsang
Kun-Dao Jiang
Published in:
CIS (1) (2008)
Keyphrases
</>
malicious attacks
allocation strategy
allocation strategies
peer to peer
bidding strategies