Sign in

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.

Oscar EsparzaMiguel SorianoJose L. MuñozJordi Forné
Published in: ISCC (2003)
Keyphrases