Login / Signup
Individual Security and Network Design with Malicious Nodes.
Tomasz Janus
Mateusz Skomra
Marcin Dziubinski
Published in:
AAMAS (2018)
Keyphrases
</>
network design
malicious nodes
wireless sensor networks
communication networks
network architecture
access control
network security
network nodes
malicious behavior
data mining
security policies
multi agent systems
intrusion detection
computer security