Login / Signup

A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA.

Faya AlgahtaniTheo TryfonasGeorge Oikonomou
Published in: DCOSS (2021)
Keyphrases
  • watermarking scheme
  • security protocols
  • malicious attacks
  • information systems
  • digital images
  • countermeasures
  • watermarking algorithm
  • image watermarking
  • cryptographic protocols
  • traffic analysis
  • terrorist attacks