Two quarantine models on the attack of malicious objects in computer network

From MaRDI portal
Publication:1954751

DOI10.1155/2012/407064zbMATH Open1264.68015OpenAlexW1975415929WikidataQ58911542 ScholiaQ58911542MaRDI QIDQ1954751FDOQ1954751

Aditya Kumar Singh, Bimal Kumar Mishra

Publication date: 11 June 2013

Published in: Mathematical Problems in Engineering (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1155/2012/407064




Recommendations



Cites Work


Cited In (6)





This page was built for publication: Two quarantine models on the attack of malicious objects in computer network

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1954751)