Research Article

Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication

Figure 1

Flowchart of the proposed study.