Login / Signup
Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks.
Yi Tan
Kai Hong
Shamik Sengupta
K. P. Subbalakshmi
Published in:
GLOBECOM (2011)
Keyphrases
</>
malicious users
end users
user defined
relevance feedback
user preferences
fault tolerant
user satisfaction
user interface
user experience
collaborative filtering
network structure
user model
countermeasures
heterogeneous networks
security mechanisms