Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, c...
Saved in:
Main Authors: | Banghua Wu, Shah Nazir, Neelam Mukhtar |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2020/6690569 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Rough Set Approach toward Data Modelling and User Knowledge for Extracting Insights
by: Xiaoqun Liao, et al.
Published: (2021-01-01) -
Implementasi Mekanisme End-To-End Security pada IoT Middleware
by: Eko Sakti Pramukantoro, et al.
Published: (2019-05-01) -
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
by: Muhammad Shahid Dildar, et al.
Published: (2025-01-01) -
Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
by: Nidhi Goel, et al.
Published: (2014-01-01) -
Introduction. Chronicles of the End of the World: The End is not the End
by: Arnaud Schmitt
Published: (2017-09-01)