Login / Signup

An evaluation method for secure virtual network embedding algorithms.

Hak Suh KimSang-Ho Lee
Published in: J. Comput. Virol. Hacking Tech. (2017)
Keyphrases
  • evaluation method
  • evaluation methods
  • learning algorithm
  • evaluation model
  • virtual environment
  • theoretical analysis
  • wireless sensor networks
  • design process
  • fuzzy comprehensive evaluation