Login / Signup
Defense against an opportunistic challenger: Theory and experiments.
Cary A. Deck
Joshua Foster
Hongwei Song
Published in:
Eur. J. Oper. Res. (2015)
Keyphrases
</>
theoretical framework
network security
real time
theoretical basis
formal theory
genetic algorithm
database systems
data mining
learning algorithm
wireless sensor networks
computational model