AI, self-driving car, IoT, Wearable Collection
|
Security
a paper talks about how to detect DoM(DoS) attack, just simulation in CMU, and equations like p = (1-q)^x. :(
In GDT, if the compromised node cheats the network with a wrong locaiton? what will happen ?
|