Login / Signup
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
Yuanyuan Zhang
Marine Minier
Published in:
J. Comput. Networks Commun. (2012)
Keyphrases
</>
countermeasures
knowledge discovery
java card
data delivery
data mining techniques
network structure
end to end
information security
network bandwidth