Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs

Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio. Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs. In Arkady B. Zaslavsky, Panos K. Chrysanthis, Christian Becker, Jadwiga Indulska, Mohamed F. Mokbel, Daniela Nicklas, Chi-Yin Chow, editors, IEEE 15th International Conference on Mobile Data Management, MDM 2014, Brisbane, Australia, July 14-18, 2014 - Volume 1. pages 279-288, IEEE, 2014. [doi]

Abstract

Abstract is missing.