Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.
Banghua WuShah NazirNeelam MukhtarPublished in: Complex. (2020)
Keyphrases
- end to end
- high bandwidth
- congestion control
- ad hoc networks
- security measures
- admission control
- wireless ad hoc networks
- authentication protocol
- multi hop
- multipath
- internet protocol
- rough sets
- security issues
- scalable video
- communication protocol
- application layer
- rate allocation
- communication systems
- resource constrained
- key management
- content delivery
- communication networks