Login / Signup
The Sybil Attack.
John R. Douceur
Published in:
IPTPS (2002)
Keyphrases
</>
malicious users
detection mechanism
malicious nodes
countermeasures
secret key
neural network
information systems
dos attacks
e learning
cyber attacks
abstract argumentation
data corruption