@dblp

Vulnerability Assessment of Complex Networks Based on Optimal Flow Measurements under Intentional Node and Edge Attacks.

, , , und . ICT Innovations, Seite 167-176. Springer, (2009)

Links und Ressourcen

Tags