NetProtect: Network Perturbations to Protect Nodes against Entry-Point Attack.
Ricky LaishramPegah HozhabrierdiJeremy D. WendtSucheta SoundarajanPublished in: WebSci (2021)
Keyphrases
- entry point
- network structure
- entry points
- malicious nodes
- hidden nodes
- network topologies
- network nodes
- real world networks
- information networks
- complex networks
- mobile nodes
- sparsely connected
- mesh network
- local area network
- network model
- network connectivity
- fully connected
- communication networks
- destination node
- peer to peer
- unstructured peer to peer
- neighboring nodes
- intermediate nodes
- centrality measures
- privacy protection