Login / Signup

Defending flooding attack in Delay Tolerant Networks.

Preeti NagrathSandhya AnejaG. N. Purohit
Published in: ICOIN (2015)
Keyphrases
  • delay tolerant
  • road network
  • ddos attacks
  • location privacy
  • end to end delay
  • mobile users
  • network infrastructure
  • wireless networks
  • neural network
  • moving objects
  • computer networks
  • secret key