Login / Signup
Efficient Best Response Computation for Strategic Network Formation Under Attack.
Tobias Friedrich
Sven Ihde
Christoph Keßler
Pascal Lenzner
Stefan Neubert
David Schumann
Published in:
SAGT (2017)
Keyphrases
</>
case study
peer to peer
computationally expensive
dos attacks
network configuration
attack graph
attack graphs
information systems
wireless sensor networks
mobile robot
knowledge management
communication networks
efficient computation
denial of service attacks