Login / Signup

On Node Capturing Attacker Strategies (Transcript of Discussion).

Filip Jurnecka
Published in: Security Protocols Workshop (2014)
Keyphrases
  • data mining
  • machine learning
  • search strategies
  • literature review
  • database
  • multi agent
  • optimal path