Sciweavers

CORR
2006
Springer
110views Education» more  CORR 2006»
14 years 14 days ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja