Modeling the Dynamics of Compromised Networks
mag(2011)
Key words
efficiency,topology,simulation,security,reaction rate,algorithms,kinetics,cyber security,prediction model,programming,vectors,network topology,reaction kinetics
AI Read Science
Must-Reading Tree
Example
![](https://originalfileserver.aminer.cn/sys/aminer/pubs/mrt_preview.jpeg)
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined