Abstract
This paper examines a network disruption model from the perspective of a network attacker, who wishes to identify the subset of K nodes to disable on ......
小提示:本篇文献需要登录阅读全文,点击跳转登录