Secure synchronization of complex networks under deception attacks against vulnerable nodes.
Dong DingZe TangYan WangZhicheng JiPublished in: Appl. Math. Comput. (2021)
Keyphrases
- complex networks
- secure routing
- network structure
- real world networks
- scale free networks
- betweenness centrality
- small world
- security mechanisms
- community detection
- stream cipher
- cryptographic protocols
- security protocols
- chosen plaintext
- security risks
- scale free
- graph theory
- network analysis
- information theoretic concepts
- security measures
- community structure
- social network analysis
- ad hoc networks
- centrality measures
- routing protocol
- social networks
- network topology
- community detection algorithms
- network evolution
- biological networks
- link prediction
- shortest path
- security threats
- degree centrality
- small world networks
- countermeasures
- network motifs
- online social networks
- community discovery
- security issues
- functional modules
- malicious nodes
- watermarking scheme
- key management
- protein interaction networks
- security requirements
- weighted graph
- wireless sensor networks