Login / Signup

MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks.

Yanzhi RenMooi Choo ChuahJie YangYingying Chen
Published in: WCNC (2010)
Keyphrases
  • detecting malicious
  • end hosts
  • network structure
  • network security
  • social networks
  • mobile nodes
  • node failures
  • computer networks
  • information systems
  • source code
  • network topology
  • ip addresses