Login / Signup
Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs.
Takuji Tsuda
Yuka Komai
Yuya Sasaki
Takahiro Hara
Shojiro Nishio
Published in:
MDM (1) (2014)
Keyphrases
</>
query processing
data sets
data collection
database
data sources
data analysis
uncertain data
databases
data points
data distribution
user defined
network structure
sensitive data