Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Distribution strategy

biblio

Visible to the public Detection of Sybil Attack on Tor Resource Distribution

Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
  • Approximation algorithms
  • tor resource distribution
  • tor anonymous communication system
  • suspicious malicious users
  • resource distribution process
  • resource distribution
  • minimum malicious user
  • Integer Linear Program
  • enumeration attacks
  • Distribution strategy
  • computer program
  • anonymous communication system
  • Bipartite graph
  • Linear programming
  • detection method
  • Bridges
  • computer network security
  • Communication Systems
  • integer programming
  • Relays
  • Web sites
  • sybil attacks
  • Metrics
  • resource management
  • graph theory
  • Sybil attack
  • detection
  • composability
  • pubcrawl
  • Resiliency
  • network security

Terms of Use  |  ©2023. CPS-VO