Tweet | |
T. Tsuda, Y. Komai, Y. Sasaki, T. Hara, and S. Nishio, "Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs," Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014), pp. 279-288 July 2014. | |
ID | 531 |
分類 | 国際会議 |
タグ | against attack data identification malicious manets node processing query replacement top-k |
表題 (title) |
Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs |
表題 (英文) |
|
著者名 (author) |
Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio |
英文著者名 (author) |
,,Yuya Sasaki,Takahiro Hara,Shojiro Nishio |
キー (key) |
,,Yuya Sasaki,Takahiro Hara,Shojiro Nishio |
定期刊行物名等 |
Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014) |
定期刊行物名等 |
|
巻数 (volume) |
|
号数 (number) |
|
ページ範囲 (pages) |
279-288 |
刊行月 (month) |
7 |
出版年 (year) |
2014 |
Impact Factor (JCR) |
|
URL |
|
付加情報 (note) |
助成:挑戦的萌芽研究(26540035),基盤研究S(21220002),基盤研究B(24300037),開催地:Brisbane, Australia,開催日程:7/14-7/18 |
発表年度 |
2014年度 |
内容梗概 (abstract) |
|
論文電子ファイル | 利用できません. |
BiBTeXエントリ |
@article{id531, title = {Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in {MANETs}}, author = {Takuji Tsuda and Yuka Komai and Yuya Sasaki and Takahiro Hara and Shojiro Nishio}, journal = {Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014)}, pages = {279-288}, month = {7}, year = {2014}, note = {助成:挑戦的萌芽研究(26540035),基盤研究S(21220002),基盤研究B(24300037),開催地:Brisbane, Australia,開催日程:7/14-7/18}, annote = {2014年度}, } |