Login / Signup
Security Analyze with Malicious Nodes in Sharding Blockchain Based Fog Computing Networks.
Xiaoge Huang
Yongsheng Wang
Qianbin Chen
Jie Zhang
Published in:
VTC Fall (2021)
Keyphrases
</>
malicious nodes
network nodes
wireless sensor networks
network topologies
malicious behavior
computer networks
information security
social networks
ad hoc networks
malware detection
intrusion detection
access control
black hole
multipath routing
network security
security policies
power law