Detecting and defending against malicious attacks in the iTrust information retrieval network.
Yung-Ting ChuangIsai Michel LomberaP. M. Melliar-SmithLouise E. MoserPublished in: ICOIN (2012)
Keyphrases
- malicious attacks
- information retrieval
- network model
- network traffic
- computer networks
- peer to peer
- search engine
- information extraction
- neural network
- network design
- information retrieval systems
- network structure
- complex networks
- wireless sensor networks
- communication networks
- network resources
- network topologies
- response time
- web search
- query expansion
- anomaly detection
- quality of service
- document retrieval
- relevance feedback
- artificial neural networks
- learning algorithm
- data sets