Login / Signup
Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security.
Srikanth Bethu
K. Kanthi Kumar
Mohammed Asrar Ahmed
S. Soujanya
Published in:
CoRR (2013)
Keyphrases
</>
network security
intrusion detection system
intrusion detection
risk assessment
network traffic
data mining
traffic analysis
databases
social networks
end to end