Download citation

Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game

RAIRO-Oper. Res., 50 2 (2016) 285-296
DOI: https://doi.org/10.1051/ro/2015047