Sign in

Security on the Edge: The Role of Autonomy in Securing DTNs.

Edward J. BirraneSarah Heiner
Published in: WiSEE (2023)
Keyphrases
  • information security
  • delay tolerant
  • security issues
  • network security
  • intrusion detection
  • real time
  • access control
  • security requirements