Reactive tabu search in unmanned aerial reconnaissance simulations
Proceedings of the 30th conference on Winter simulation
Multiobjective Evolutionary Algorithms: Analyzing the State-of-the-Art
Evolutionary Computation
Hi-index | 0.00 |
The number of security breaches and network attacks increases as well as the sophistication of intruders and bad actors. To increase information integrity and network security, very complex processes are enlisted in cryptographic systems, such as chaos ...