Login / Signup
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Liang Liu
Zuchao Ma
Weizhi Meng
Published in:
Future Gener. Comput. Syst. (2019)
Keyphrases
</>
malicious nodes
network nodes
wireless sensor networks
computer networks
malicious behavior
spectrum sensing
ad hoc networks
network topologies
trust model
black hole
network services
mobile ad hoc networks
complex networks
social networks
real time
energy consumption
response time