Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game

From MaRDI portal
Publication:2805485












This page was built for publication: Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2805485)