Login / Signup

Mitigating Reordering Vulnerability of MPTCP With Transparent Proxies.

Tacettin AyarLukasz BudziszBerthold Rathke
Published in: ICIN (2019)
Keyphrases
  • risk management
  • risk assessment
  • machine learning
  • penetration testing
  • database
  • neural network
  • information systems
  • support vector
  • information technology
  • multiresolution