Login / Signup
Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.
Chi Lin
Guowei Wu
Xiaochen Lai
Tie Qiu
Published in:
ICA3PP (3) (2015)
Keyphrases
</>
resource allocation
black hole
countermeasures
cooperative
directed graph
information resources
resource constraints
traffic analysis
terrorist attacks
malicious users
digital images
security mechanisms
security threats
attack detection