Login / Signup
K-core-preferred Attack to the Internet: Is It More Malicious Than Degree Attack?
Jichang Zhao
Junjie Wu
Mingming Chen
Zhiwen Fang
Ke Xu
Published in:
WAIM (2013)
Keyphrases
</>
malicious users
malicious attacks
malicious activities
detecting malicious
countermeasures
identity theft
neural network
detection mechanism
power analysis
computer viruses
normal traffic