Sign in

Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks.

Doina BucurGiovanni Iacca
Published in: Expert Syst. Appl. (2017)
Keyphrases
  • search methods
  • delay tolerant
  • search algorithm
  • road network
  • metaheuristic
  • location privacy
  • end to end delay
  • mobile users
  • network infrastructure
  • social networks
  • mobile phone
  • network design