Login / Signup

Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks.

Yudong ZhaoKe XuRashid MijumbiMeng Shen
Published in: BigCom (2015)
Keyphrases
  • data sets
  • data analysis
  • data sources
  • data integrity
  • data mining
  • data points
  • design process
  • information security
  • data publishing