Login / Signup
Security Attacks in Named Data Networking: A Review and Research Directions.
Naveen Kumar
Ashutosh Kumar Singh
Abdul Aleem
Shashank Srivastava
Published in:
J. Comput. Sci. Technol. (2019)
Keyphrases
</>
data sets
data collection
information security
data quality
database
data sources
data mining techniques
access control
sensitive data
unauthorized access
data analysis
intrusion detection
countermeasures
security vulnerabilities
information leakage