Login / Signup
Malicious node detection using ID-based authentication technique.
Anurag Gupta
Prema Mohit
Arijit Karati
Ruhul Amin
G. P. Biswas
Published in:
RAIT (2016)
Keyphrases
</>
detect malicious
object detection
anomaly detection
detection algorithm
false positives
automatic detection
false alarms
detection method
key distribution
semi fragile watermarking
authentication protocol
user authentication