Revision history of "File:Iotsec 0817.pdf"

Jump to: navigation, search

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • (cur | prev) 08:26, 30 August 2017Peder.Aursand (Talk | contribs). . (181 bytes) (+181). . (We demonstrate how evolutionary game theory can be used to model confidentiality in an advanced metering infrastructure. Theory is introduced and an example case study is presented.)