Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.
Jie LiuF. Richard YuChung-Horng LungHelen TangPublished in: IEEE Trans. Wirel. Commun. (2009)
Keyphrases
- intrusion detection
- high security
- mobile ad hoc networks
- security analysis
- intrusion detection system
- anomaly detection
- image encryption
- user authentication
- network security
- network traffic
- information security
- routing protocol
- ad hoc networks
- data mining
- multipath
- computer networks
- security requirements
- mobile networks
- key management
- encryption algorithm
- response time