Mitigating malicious feedback attacks in trust management systems.
Soon-Keow ChongJemal H. AbawajyPublished in: Int. J. Trust. Manag. Comput. Commun. (2015)
Keyphrases
- management system
- malicious nodes
- malicious users
- malicious attacks
- detect malicious
- wireless sensor networks
- detecting malicious
- malicious behavior
- trust management
- insider attacks
- malicious code
- malicious activities
- database management systems
- normal traffic
- reputation mechanisms
- trust model
- trust evaluation
- network nodes
- security threats
- semi fragile watermarking
- insider threat
- countermeasures
- spectrum sensing
- attack detection
- risk management
- traffic analysis
- water resources
- malicious traffic
- computer security
- file management
- information systems