Login / Signup
An evaluation method for secure virtual network embedding algorithms.
Hak Suh Kim
Sang-Ho Lee
Published in:
J. Comput. Virol. Hacking Tech. (2017)
Keyphrases
</>
evaluation method
evaluation methods
learning algorithm
evaluation model
virtual environment
theoretical analysis
wireless sensor networks
design process
fuzzy comprehensive evaluation