Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/iccsa/HidouriHTHM22
%A Hidouri, Abdelhak
%A Hadded, Mohamed
%A Touati, Haifa
%A Hajlaoui, Nasreddine
%A Muhlethaler, Paul
%B ICCSA (1)
%D 2022
%E Gervasi, Osvaldo
%E Murgante, Beniamino
%E Hendrix, Eligius M. T.
%E Taniar, David
%E Apduhan, Bernady O.
%I Springer
%K dblp
%P 310-323
%T Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN).
%U http://dblp.uni-trier.de/db/conf/iccsa/iccsa2022-1.html#HidouriHTHM22
%V 13375
%@ 978-3-031-10522-7
@inproceedings{conf/iccsa/HidouriHTHM22,
added-at = {2024-02-05T00:00:00.000+0100},
author = {Hidouri, Abdelhak and Hadded, Mohamed and Touati, Haifa and Hajlaoui, Nasreddine and Muhlethaler, Paul},
biburl = {https://www.bibsonomy.org/bibtex/2adc7e213843a00f6607558cc3dcc0598/dblp},
booktitle = {ICCSA (1)},
crossref = {conf/iccsa/2022-1},
editor = {Gervasi, Osvaldo and Murgante, Beniamino and Hendrix, Eligius M. T. and Taniar, David and Apduhan, Bernady O.},
ee = {https://doi.org/10.1007/978-3-031-10522-7_22},
interhash = {de86472890ad3f5f3001b06c529f30c6},
intrahash = {adc7e213843a00f6607558cc3dcc0598},
isbn = {978-3-031-10522-7},
keywords = {dblp},
pages = {310-323},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T22:43:11.000+0200},
title = {Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN).},
url = {http://dblp.uni-trier.de/db/conf/iccsa/iccsa2022-1.html#HidouriHTHM22},
volume = 13375,
year = 2022
}