Mitigation of Sybil Attacks in Structured P2P Overlay Networks.
Zied TrifaMaher KhemakhemPublished in: SKG (2012)
Keyphrases
- malicious users
- countermeasures
- security threats
- real world
- risk management
- denial of service attacks
- web services
- wireless sensor networks
- malicious nodes
- computer security
- security mechanisms
- chosen plaintext
- digital image watermarking
- attack detection
- terrorist attacks
- traffic analysis
- database
- watermarking scheme
- database systems
- information systems
- neural network