On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks.

Kai WangYude ZhaoShugang LiuXiangrong Tong
Published in: IET Networks (2018)
Keyphrases
  • malicious attacks
  • countermeasures
  • security mechanisms
  • viewpoint
  • watermarking scheme
  • security risks
  • attack detection
  • image watermarking
  • traffic analysis
  • malicious users
  • digital image watermarking