LSA: Understanding the Threat of Link-Based Scapegoating Attack in ...
ieeexplore.ieee.org › document
Apr 27, 2023 · This article in particular investigates the conditions and efficient methods to launch LSA from an attacker's point of view.
When identification is not guaranteed, a new type of attack, i.e., scapegoating attack, becomes a critical threat to the network tomography. Chiu et al. [21] ...
This article investigates the conditions and efficient methods to launch LSA from an attacker's point of view, and presents an efficient algorithm to figure ...
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography. IEEE Trans. Netw. Sci. Eng. 10(6): 3670-3681 (2023); 2022. [c4]. view.
To fully understand the threat from LSA, this paper in particular investigates the conditions and efficient methods to launch LSA from an attacker's point of ...
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography. X Xu, Y Wang, L Xu, D Li. IEEE Transactions on Network Science and ...
LSA: Understanding the Threat of Link-based Scapegoating Attack in Network Tomography. [...] Xiaojia Xu, Yongcai Wang, Lanling Xu, Deying Li. 31 Dec 2022-IEEE ...
LSA: Understanding the Threat of Link-based Scapegoating Attack in Network Tomography. IEEE Transactions on Network Science and Engineering. 2023 | Journal ...
A new attack strategy is proposed, called measurement integrity attack, in which malicious nodes can substantially damage a network and at the same time ...
... LSA: Understanding the Threat of Link-based Scapegoating Attack in Network ... Corona based deployment strategies in wireless sensor network. A wireless ...