Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game

From MaRDI portal
Publication:2805485

DOI10.1051/RO/2015047zbMATH Open1338.90092OpenAlexW2305592548MaRDI QIDQ2805485FDOQ2805485


Authors: Karima Adel-Aissanou, Sara Berri, Myria Bouhaddi, Mohammed Said Radjef Edit this on Wikidata


Publication date: 11 May 2016

Published in: RAIRO. Operations Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1051/ro/2015047




Recommendations




Cites Work


Cited In (1)





This page was built for publication: Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2805485)