Bibtex International Conference

Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs

Authors Takuji Tsuda Yuka Komai Yuya Sasaki Takahiro Hara Shojiro Nishio
Book Proceedings of IEEE International Conference on Mobile Data Management (From Proceedings of IEEE International Conference on Mobile Data Management) Page.279-288,
Published 2014 . 07
Tags
Fund 助成:挑戦的萌芽研究(26540035), 基盤研究S(21220002), 基盤研究B(24300037), 開催地:Brisbane, Australia, 開催日程:7/14-7/18
DOI -
URL -
Bibtex
@inproceedings{id_9251,
  title     = {Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in {MANETs}},
  author    = {Tsuda, Takuji and Komai, Yuka and Sasaki, Yuya and Hara, Takahiro and Nishio, Shojiro},
  booktitle = {Proceedings of IEEE International Conference on Mobile Data Management},
  pages     = {279--288},
  month     = {7},
  year      = {2014},
}
Publication Zoo GitHub