network in the presence of primary user emulation attack.
Deepa DasSusmita DasPublished in: IET Networks (2017)
Keyphrases
- malicious users
- user interface
- network traffic
- user preferences
- network management
- user interaction
- computer networks
- peer to peer
- network intrusion
- normal behavior
- ddos attacks
- recommender systems
- network administrators
- denial of service attacks
- user experience
- network structure
- user defined
- anomaly detection
- end users
- network model
- user profiles
- relevance feedback
- network attacks