Attack and defense in the layered cyber-security model and their \((1 \pm \varepsilon)\)-approximation schemes (Q2208245)
From MaRDI portal
![]() | This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Attack and defense in the layered cyber-security model and their \((1 \pm \varepsilon)\)-approximation schemes |
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Attack and defense in the layered cyber-security model and their \((1 \pm \varepsilon)\)-approximation schemes |
scientific article |
Statements
Attack and defense in the layered cyber-security model and their \((1 \pm \varepsilon)\)-approximation schemes (English)
0 references
23 October 2020
0 references
algorithms
0 references
complexity
0 references
graph theory
0 references
0 references
0 references