File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Items per page:
Search for media name:
Username:
Include old versions of images

descDate Name Thumbnail Size User Description Versions
08:26, 30 August 2017 Iotsec 0817.pdf (file) 1.24 MB Peder.Aursand We demonstrate how evolutionary game theory can be used to model confidentiality in an advanced metering infrastructure. Theory is introduced and an example case study is presented. 1