Two Quarantine Models on the Attack of Malicious Objects in Computer Network
Mathematical Problems in Engineering - Egypt
doi 10.1155/2012/407064
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2012
Authors
Publisher
Hindawi Limited