Resource-misuse attack detection in delay-tolerant networks | IEEE Conference Publication | IEEE Xplore