Login / Signup
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.
Yanzhi Ren
Mooi Choo Chuah
Jie Yang
Yingying Chen
Published in:
WCNC (2010)
Keyphrases
</>
detecting malicious
end hosts
network structure
network security
social networks
mobile nodes
node failures
computer networks
information systems
source code
network topology
ip addresses