@dblp

Vulnerability Assessment of Complex Networks Based on Optimal Flow Measurements under Intentional Node and Edge Attacks.

, , , and . ICT Innovations, page 167-176. Springer, (2009)

Links and resources

Tags