scientific article; zbMATH DE number 7042534
From MaRDI portal
Publication:4630482
zbMATH Open1410.68036MaRDI QIDQ4630482FDOQ4630482
Authors: Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
Publication date: 26 March 2019
Full work available at URL: https://ieeexplore.ieee.org/document/6103884/
Title of this publication is not available (Why is that?)
Recommendations
- Capturing the interplay between malware and anti-malware in a computer network
- Robust Network Supercomputing with Malicious Processes
- Simulation of malicious activity in wide area networks
- Malware propagation in clustered computer networks
- Spread of malicious objects in computer network: a fuzzy approach
Analysis of algorithms and problem complexity (68Q25) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Internet topics (68M11) Authentication, digital signatures and secret sharing (94A62)
Cited In (1)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4630482)