Login / Signup
Optimal network topologies for mitigating security and epidemic risks.
Ashish Ranjan Hota
Shreyas Sundaram
Published in:
Allerton (2016)
Keyphrases
</>
network topologies
risk management
risk analysis
network topology
risk assessment
optimal solution
access control
information security
decision making
intrusion detection
network security
security policies
risk factors
security issues
security requirements
interacting agents