How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs.
Yoshiki AbeMitsugu IwamotoKazuo OhtaPublished in: ISITA (2020)
Keyphrases
- majority voting
- detect malicious
- knn
- ensemble methods
- lightweight
- k nearest neighbor
- smart card
- classifier ensemble
- detecting malicious
- support vector machine
- random forests
- binary classification
- end hosts
- natural language processing
- benchmark datasets
- data mining
- ensemble classifier
- decision trees
- tcp ip
- information retrieval