

Author: Wang Weichao Kong Jiejun Bhargava Bharat Gerla Mario
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.3, Iss.1, 2007-12, pp. : 10-23
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Nuclear threat detection with mobile distributed sensor networks
Annals of Operations Research, Vol. 187, Iss. 1, 2011-07 ,pp. :