Login / Signup
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
Liang Xie
Sencun Zhu
Published in:
ACM Trans. Inf. Syst. Secur. (2008)
Keyphrases
</>
attack detection
attack scenarios
overlay network
multistage
structured peer to peer
intrusion detection system
peer to peer
cyber attacks
publish subscribe
product recommendation
network topology
bandwidth consumption
node failures
anomaly detection
fault tolerance
cloud computing
dynamic programming
databases