Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN.
Deevi Radha RaniG. GeethakumariPublished in: Comput. Commun. (2020)
Keyphrases
- data transmission
- routing protocol
- secure routing
- data acquisition
- base station
- wireless sensor networks
- computer networks
- energy consumption
- communication networks
- data delivery
- security mechanisms
- multi hop
- cryptographic protocols
- transmission delay
- data transfer
- anomaly detection
- sensor nodes
- error detection and correction
- security issues
- sensor networks
- wireless networks
- security requirements
- computer security
- security analysis
- database systems
- ad hoc networks
- distributed databases
- end to end