Sign in
Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks.
Doina Bucur
Giovanni Iacca
Published in:
Expert Syst. Appl. (2017)
Keyphrases
</>
search methods
delay tolerant
search algorithm
road network
metaheuristic
location privacy
end to end delay
mobile users
network infrastructure
social networks
mobile phone
network design