Login / Signup

Defense against an opportunistic challenger: Theory and experiments.

Cary A. DeckJoshua FosterHongwei Song
Published in: Eur. J. Oper. Res. (2015)
Keyphrases
  • theoretical framework
  • network security
  • real time
  • theoretical basis
  • formal theory
  • genetic algorithm
  • database systems
  • data mining
  • learning algorithm
  • wireless sensor networks
  • computational model