Login / Signup

Evaluation of Sybil Attacks Protection Schemes in KAD.

Thibault CholezIsabelle ChrismentOlivier Festor
Published in: AIMS (2009)
Keyphrases
  • protection schemes
  • operating system
  • malicious users
  • database
  • data collection
  • access control
  • intrusion detection