//-->
A cluster-based network architecture scheme for QoS improvement in WLAN
Vignesh, N. Arun, (2017)
Hidden Structure : Using Network Methods to Map System Architecture
Baldwin, Carliss Y., (2014)
Network models for cyber attacks evaluation
Facchinetti, Silvia, (2023)
Transforming information security : optimizing five concurrent trends to reduce resource drain
Moriarty, Kathleen M., (2020)
6 Authentication and Authorization
9 Looking Forward