Login / Signup
On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
Dapeng Wang
Pei Li
Pengfei Hu
Kai Xing
Yang Wang
Liusheng Huang
Yanxia Rong
Published in:
WASA (2012)
Keyphrases
</>
attack detection
multistage
intrusion detection system
cyber attacks
product recommendation
mobile ad hoc networks
anomaly detection
network security
attack scenarios
information systems
dynamic programming
knowledge discovery