Login / Signup
Hop integrity in computer networks.
Mohamed G. Gouda
E. N. Elnozahy
Chin-Tser Huang
Tommy M. McGuire
Published in:
IEEE/ACM Trans. Netw. (2002)
Keyphrases
</>
computer networks
network security
network traffic
communication networks
intrusion detection system
network management
computer systems
integrity constraints
security problems
database
network monitoring
data sets
computer networking
computer network security