Login / Signup
TowerDefense: Deployment strategies for battling against IP prefix hijacking.
Tongqing Qiu
Lusheng Ji
Dan Pei
Jia Wang
Jun (Jim) Xu
Published in:
ICNP (2010)
Keyphrases
</>
real time
artificial intelligence
data structure
bayesian networks
data sets
neural network
case study
mobile robot