Login / Signup
The Reputation Lag Attack.
Sean Sirur
Tim Muller
Published in:
IFIPTM (2019)
Keyphrases
</>
trust relationships
countermeasures
trust evaluation
trust model
malicious nodes
database
neural network
search engine
wireless sensor networks
peer to peer
cyber attacks
detection mechanism
denial of service attacks
reputation management