Introduction to the Special Issue on Opportunistic Network and its Security Challenges.
Rosilah HassanKhairol Amali Bin AhmadKhaleel AhmadPublished in: Scalable Comput. Pract. Exp. (2019)
Keyphrases
- security threats
- network management
- security issues
- enterprise network
- security problems
- forensic analysis
- intrusion detection
- security measures
- security mechanisms
- network topologies
- security protection
- complex networks
- lessons learned
- computer networks
- wireless sensor networks
- security concerns
- application level
- information security
- network traffic
- network structure
- real world
- key management
- wireless sensor
- network resources
- security risks
- anomaly detection
- attack graph
- access control
- network connection
- buffer overflow