Incorporating evolutionary computation for securing wireless network against cyberthreats
Crossref DOI link: https://doi.org/10.1007/s11227-020-03161-w
Published Online: 2020-01-20
Published Print: 2020-11
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dwivedi, Shubhra
Vardhan, Manu
Tripathi, Sarsij
Text and Data Mining valid from 2020-01-20
Version of Record valid from 2020-01-20
Article History
First Online: 20 January 2020