Protocol Masking to Evade Network Surveillance.
Stanislav NurilovKulesh ShanmugasundaramNasir D. MemonPublished in: CISS (2006)
Keyphrases
- network protocols
- communication protocol
- network model
- tcp ip
- real time
- complex networks
- network traffic
- computer networks
- packet filtering
- remote server
- mac protocol
- mobile nodes
- lightweight
- wireless sensor networks
- network management
- video surveillance
- human visual system
- end to end
- network layer
- network structure
- wireless networks
- transport protocol
- file transfer