"A game theoretic approach to detect and co-exist with malicious nodes in ..."

Wenjing Wang et al. (2014)

Details and statistics

DOI: 10.1016/J.COMNET.2014.06.008

access: closed

type: Journal Article

metadata version: 2020-02-19

a service of  Schloss Dagstuhl - Leibniz Center for Informatics