Login / Signup

Performance analysis of P2P networks with malicious nodes.

Zhanyou MaQiannan SiYilin LiuShunzhi Wang
Published in: Clust. Comput. (2022)
Keyphrases
  • malicious nodes
  • malicious behavior
  • wireless sensor networks
  • peer to peer
  • network nodes
  • overlay network
  • data processing
  • real time
  • information systems
  • open source
  • ad hoc networks
  • spectrum sensing