Login / Signup
K-core-based attack to the internet: Is it more malicious than degree-based attack?
Jichang Zhao
Junjie Wu
Mingming Chen
Zhiwen Fang
Xu Zhang
Ke Xu
Published in:
World Wide Web (2015)
Keyphrases
</>
malicious users
malicious attacks
countermeasures
neural network
secret key
attack detection
normal traffic
detecting malicious
detect malicious
wireless sensor networks
dos attacks
detection mechanism
power analysis
malicious behavior
insider attacks