- Xiao Liu, Mianxiong Dong, Kaoru Ota, Laurence T. Yang, Anfeng Liu:
Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. 1-26
- Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). 27-52
- Nachshon Cohen, Zeev Nutov:
Approximating Steiner trees and forests with minimum number of Steiner points. 53-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.