Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network.
Frank Yeong-Sung LinPo-Hao TsangYi-Luen LinPublished in: ARES (2007)
Keyphrases
- black hole
- traffic analysis
- network anomaly detection
- network nodes
- malicious nodes
- peer to peer
- security threats
- complex networks
- countermeasures
- cooperative game
- social networks
- network attacks
- denial of service attacks
- cognitive radio
- computer networks
- information security
- hidden nodes
- intermediate nodes
- network topologies
- optimal path
- neural network
- buffer overflow