Login / Signup
Protecting against malicious and selective forwarding attacks for P2P search & retrieval system.
Yung-Ting Chuang
Published in:
Peer-to-Peer Netw. Appl. (2017)
Keyphrases
</>
overlay network
detect malicious
search strategy
malicious attacks
search algorithm
search space
retrieval systems
countermeasures
malicious users
user queries
resource discovery
information retrieval
information retrieval systems
peer to peer
computer security