Two quarantine models on the attack of malicious objects in computer network

From MaRDI portal
Publication:1954751

DOI10.1155/2012/407064zbMath1264.68015OpenAlexW1975415929WikidataQ58911542 ScholiaQ58911542MaRDI QIDQ1954751

Aditya Kumar Singh, Bimal Kumar Mishra

Publication date: 11 June 2013

Published in: Mathematical Problems in Engineering (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1155/2012/407064




Related Items



Cites Work