Decontaminating a Network from a Black Virus

Article Properties
Refrences
Title Journal Journal Categories Citations Publication Date
10.1007/11945529_23
10.1007/978-3-642-24100-0_41
10.1007/978-3-642-22212-2_17
10.1007/978-3-540-75142-7_11
Distributed chasing of network intruders Theoretical Computer Science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
11 2008
Citations
Title Journal Journal Categories Citations Publication Date
On-line Search in Two-Dimensional Environment

Theory of Computing Systems
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2019
Black hole search in computer networks: State-of-the-art, challenges and future directions Journal of Parallel and Distributed Computing
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
6 2016
More agents may decrease global work: A case in butterfly decontamination Theoretical Computer Science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
1 2016
Explore and repair graphs with black holes using mobile entities Theoretical Computer Science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
8 2015
Citations Analysis
The category Science: Mathematics: Instruments and machines: Electronic computers. Computer science 4 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Explore and repair graphs with black holes using mobile entities and was published in 2015. The most recent citation comes from a 2019 study titled On-line Search in Two-Dimensional Environment. This article reached its peak citation in 2016, with 2 citations. It has been cited in 3 different journals. Among related journals, the Theoretical Computer Science cited this research the most, with 2 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year