//-->
Computer Network Attacks : A Potential Roadmap
Delibasis Fokas, Demetrius, (2012)
On computing the 2-diameter-constrained K-reliability of networks
Canale, Eduardo, (2013)
The analysis of financial network transaction risk control based on blockchain and edge computing technology
Li, Zhezhou, (2024)
Collaborative computer security and trust management
Seigneur, Jean-Marc, (2010)
Analysis of a consumer survey on plug-in hybrid electric vehicles
Krupa, Joseph S., (2014)
The Ground Truth program : simulations as test beds for social science research methods
Naugle, Asmeret, (2023)