Return to Article Details Protection of a network by complete secure domination Download Download PDF