Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game
RAIRO-Oper. Res., 50 2 (2016) 285-296
Published online: 24 March 2016
DOI: 10.1051/ro/2015047