Frage zu Artikel "Computational Intelligent Security in Wireless.."