z-logo
open-access-imgOpen Access
Way to minimize the time bypass compromised nodes in mobile networks
Author(s) -
Yurii Kulakov,
Alex Kogan
Publication year - 2014
Publication title -
èlektronika i svâzʹ
Language(s) - English
Resource type - Journals
eISSN - 2312-1807
pISSN - 1811-4512
DOI - 10.20535/2312-1807.2014.19.2.142268
Subject(s) - computer science , computer network , control reconfiguration , transmission (telecommunications) , quality of service , real time computing , distributed computing , embedded system , telecommunications

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here