Login / Signup
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens.
Aubrey Alston
Tamer Refaei
Published in:
NCA (2016)
Keyphrases
</>
data sets
data analysis
data processing
database
training data
data sources
network structure
raw data
end users
input data
data mining techniques
computer networks