P Kaligineedi, M Khabbazian… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
… which use these outlier factors to detect the malicious users present in the system. In Section
V, we propose malicious user detection technique which takes into consideration the users’ …