Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game (Q2805485)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game |
scientific article; zbMATH DE number 6579400
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game |
scientific article; zbMATH DE number 6579400 |
Statements
11 May 2016
0 references
\textit{Ad hoc} networks
0 references
security
0 references
clustering
0 references
evolutionary games
0 references
replicator dynamic
0 references
convergence
0 references
simulation
0 references
Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game (English)
0 references