Abstract
This paper analyzes the models and classification of secure resource management methods in distributed information communication networks in order to identify the most optimal model.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have