Login / Signup
Towards Mitigating Blackhole Attack in NDN-Enabled IoT.
Afia Anjum
Habeeb Olufowobi
Published in:
ICCE (2023)
Keyphrases
</>
management system
big data
malicious attacks
countermeasures
attack detection
cloud computing
detection mechanism
neural network
data corruption
sensor web
risk management
context aware
power analysis
data analysis
malicious users
data sets
key exchange protocol