Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.
Christian MattJesper Buus NielsenSøren Eller ThomsenPublished in: CRYPTO (2) (2022)
Keyphrases
- computer security
- information security
- intrusion detection
- social networks
- enterprise network
- computer networks
- network security
- heterogeneous networks
- data mining
- security requirements
- information assurance
- neighboring nodes
- cyber security
- security issues
- statistical databases
- security policies
- network analysis
- network structure
- anomaly detection