Defending against Contagious Attacks on a Network with Resource Reallocation.
Rufan BaiHaoxing LinXinyu YangXiaowei WuMinming LiWeijia JiaPublished in: AAAI (2021)
Keyphrases
- ddos attacks
- traffic analysis
- network anomaly detection
- security threats
- network model
- wireless sensor networks
- network structure
- peer to peer
- resource allocation
- network intrusion
- resource management
- allocation scheme
- communication networks
- complex networks
- watermarking scheme
- resource constraints
- fault injection
- social networks