Login / Signup

Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs.

Takuji TsudaYuka KomaiYuya SasakiTakahiro HaraShojiro Nishio
Published in: MDM (1) (2014)
Keyphrases
  • query processing
  • data sets
  • data collection
  • database
  • data sources
  • data analysis
  • uncertain data
  • databases
  • data points
  • data distribution
  • user defined
  • network structure
  • sensitive data