Login / Signup
Defending flooding attack in Delay Tolerant Networks.
Preeti Nagrath
Sandhya Aneja
G. N. Purohit
Published in:
ICOIN (2015)
Keyphrases
</>
delay tolerant
road network
ddos attacks
location privacy
end to end delay
mobile users
network infrastructure
wireless networks
neural network
moving objects
computer networks
secret key