Routing and location on a network with hazardous threats.
Oded BermanZvi DreznerGeorge O. WesolowskyPublished in: J. Oper. Res. Soc. (2000)
Keyphrases
- network topologies
- network structure
- network communication
- wireless ad hoc networks
- network model
- complex networks
- network routing
- computer networks
- denial of service attacks
- network nodes
- buffer overflow
- travel distance
- dynamic routing
- traffic load
- network architecture
- countermeasures
- communication networks
- ad hoc networks
- switched networks
- insider threat
- network traffic
- routing scheme
- peer to peer
- wireless sensor networks