| Trace malicious source to guarantee cyber security for m... |
10 |
| An elastic and resiliency defense against DDoS attacks o... |
7 |
| Reconfiguration in bounded bandwidth and tree-depth |
7 |
| Adapting attackers and defenders patrolling strategies: ... |
6 |
| A parameterized algorithm for the Maximum Agreement Fore... |
5 |
| Establishing evolutionary game models for CYBer security... |
4 |
| The relationship between extra connectivity and conditio... |
4 |
| On the complexity of two-dimensional signed majority cel... |
4 |
| On the transformation capability of feasible mechanisms ... |
3 |
| Homotopic properties of an M A-digitization of 2D Euclid... |
3 |