Security analysis of compromised-neighbor-tolerant networks using stochastics

Xiaohu Li, Linxiong Li

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Fingerprint

Dive into the research topics of 'Security analysis of compromised-neighbor-tolerant networks using stochastics'. Together they form a unique fingerprint.

Computer Science