Sign in

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.

Yuanyuan ZhangMarine Minier
Published in: J. Comput. Networks Commun. (2012)
Keyphrases
  • countermeasures
  • knowledge discovery
  • java card
  • data delivery
  • data mining techniques
  • network structure
  • end to end
  • information security
  • network bandwidth