Login / Signup
Tolerating malicious gossip.
Yaron Minsky
Fred B. Schneider
Published in:
Distributed Comput. (2003)
Keyphrases
</>
malicious behavior
real time
detect malicious
overlay network
pre determined
malicious attacks
database
information retrieval
computer vision
case study
special case
probabilistic model
data mining
malicious code
computer viruses
malicious users
databases