Login / Signup
The lotus-eater attack.
Ian A. Kash
Eric J. Friedman
Joseph Y. Halpern
Published in:
PODC (2008)
Keyphrases
</>
countermeasures
dos attacks
detection mechanism
secret key
data sets
image processing
cooperative
search algorithm
multi agent systems
authentication protocol
malicious attacks
digital watermark