Publisher
Springer Science and Business Media LLC
Reference14 articles.
1. Angel D, Arputhamary IA, Ezhilarasi K (2021) Location domination for generalized friendship graphs analytics. In: Proceedings of the 5th international conference on computing methodologies and communication, ICCMC 2021, pp 865–868, 9418258
2. Antony XD, Rosary M, Thomas E, Arokiaraj A (2016) Broadcasting in bloom graph. Int J Math Soft Comput 6(2):57–64
3. Armbruster B, Cole Smith J, Park K (2007) A packet filter placement problem with application to defense against spoofed denial of service attacks. Eur J Oper Res 176(2):1283–1292
4. Burgess M (2020) Hackers are targeting hospitals crippled by coronavirus, Security, Hackers are targeting hospitals crippled by coronavirus, WIRED UK
5. Cockayne EJ, Gründlingh WR, Grobler P, Munganga J (2005) Protection of a graph. Utilitas Mathematica 67:1–15
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献