Login / Signup
A resource-competitive jamming defense.
Valerie King
Seth Pettie
Jared Saia
Maxwell Young
Published in:
Distributed Comput. (2018)
Keyphrases
</>
network security
resource management
intrusion detection
resource allocation
web resources
feature selection
decision making
case study
management system
information resources
resource consumption
resource selection
resource usage
cyber defense