

Author: Lim Young Lee Dong Park Won Kook Kwang
Publisher: Springer Publishing Company
ISSN: 0929-6212
Source: Wireless Personal Communications, Vol.73, Iss.2, 2013-11, pp. : 319-328
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


A new worm propagation threat in BitTorrent: modeling and analysis
Telecommunication Systems, Vol. 45, Iss. 2-3, 2010-10 ,pp. :





