Login / Signup
Need for a Realistic Measure of Attack Severity in Centrality Based Node Attack Strategies.
Jisha Mariyam John
Divya Sindhu Lekha
Published in:
COMPLEX NETWORKS (2021)
Keyphrases
</>
secret key
authentication protocol
real life
optimal strategy
detection mechanism
data sets
similarity measure
data structure
recommender systems
random walk
lightweight
online auctions
cyber attacks
centrality measures
power analysis
malicious users