Login / Signup
Exposing anonymous network participants via an external attack.
Wesley Brandi
Martin S. Olivier
Published in:
South Afr. Comput. J. (2006)
Keyphrases
</>
peer to peer
network structure
computer networks
network traffic
communication networks
complex networks
network model
neural network
privacy preserving
countermeasures
network management
dos attacks
community members
network intrusion
attack graphs