Privacy-Constrained Network Formation.
Daron AcemogluAli MakhdoumiAzarakhsh MalekianAsuman E. OzdaglarPublished in: SIGMETRICS Perform. Evaluation Rev. (2015)
Keyphrases
- network structure
- distributed network
- peer to peer
- computer networks
- wireless sensor networks
- network traffic
- private data
- security issues
- statistical databases
- network management
- network model
- security measures
- social network data
- network topologies
- network architecture
- real time
- complex networks
- intrusion detection
- social networks
- genetic algorithm