Login / Signup

Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens.

Aubrey AlstonTamer Refaei
Published in: NCA (2016)
Keyphrases
  • data sets
  • data analysis
  • data processing
  • database
  • training data
  • data sources
  • network structure
  • raw data
  • end users
  • input data
  • data mining techniques
  • computer networks