Login / Signup
Mitigating Rogue Node Attacks in Edge Computing.
Maha Shamseddine
Wassim Itani
Auday Aldulaimy
Javid Taheri
Published in:
MENACOMM (2019)
Keyphrases
</>
edge information
undirected graph
countermeasures
black hole
tree structure
directed graph
disjoint paths
cooperative
weighted graph