Login / Signup
Pollution Attacks Identification in Structured P2P Overlay Networks.
Zied Trifa
Jalel Eddine Hajlaoui
Maher Khemakhem
Published in:
ICICS (2017)
Keyphrases
</>
real world
countermeasures
case study
traffic analysis
denial of service attacks
digital images
watermarking scheme
automatic identification
security mechanisms
image watermarking
security risks
terrorist attacks