On the Robustness of Diffusion in a Network Under Node Attacks.
Alvis LoginsYuchen LiPanagiotis KarrasPublished in: IEEE Trans. Knowl. Data Eng. (2022)
Keyphrases
- malicious nodes
- traffic analysis
- network nodes
- black hole
- security threats
- centrality measures
- buffer overflow
- network anomaly detection
- peer to peer
- diffusion model
- information diffusion
- mobile ad hoc networks
- complex networks
- ddos attacks
- network topologies
- hidden nodes
- path length
- mobile nodes
- data hiding
- insider threat
- destination node
- computer networks