Login / Signup

K-core-preferred Attack to the Internet: Is It More Malicious Than Degree Attack?

Jichang ZhaoJunjie WuMingming ChenZhiwen FangKe Xu
Published in: WAIM (2013)
Keyphrases
  • malicious users
  • malicious attacks
  • malicious activities
  • detecting malicious
  • countermeasures
  • identity theft
  • neural network
  • detection mechanism
  • power analysis
  • computer viruses
  • normal traffic