[1]
M. Toulouse, H. Le, C. V. Phung, and D. Hock, “Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System”, IJCAI, vol. 41, no. 2, Jun. 2017.