How many sensors for an acceptable breach detection probability?

Autor: Onur, Ertan, Ersoy, Cem, Deliç, Hakan
Zdroj: In Computer Communications 2006 29(2):173-182
Databáze: ScienceDirect