Login / Signup
Summary-Invisible Networking: Techniques and Defenses.
Lei Wei
Michael K. Reiter
Ketan Mayer-Patel
Published in:
ISC (2010)
Keyphrases
</>
peer to peer
distributed computing
decision trees
network security
document summarization
neural network
text summarization
machine learning
mobile devices
wireless sensor networks
distributed environment
wireless sensor
network layer