Login / Signup
Modelling a network as a spring system to estimate edge vulnerability.
Paola Lecca
Published in:
BIBM (2023)
Keyphrases
</>
network structure
peer to peer
communication networks
edge detection
computer networks
buffer overflow
wireless sensor networks
information systems
artificial neural networks
data sets
link prediction
network model
network architecture
network topologies
network parameters
image derivatives
genetic algorithm