Resource-misuse attack detection in delay-tolerant networks.
Vivek NatarajanYi YangSencun ZhuPublished in: IPCCC (2011)
Keyphrases
- delay tolerant
- attack detection
- intrusion detection system
- multistage
- road network
- intrusion detection
- computer networks
- location privacy
- end to end delay
- network infrastructure
- anomaly detection
- mobile users
- resource management
- network security
- social networks
- network traffic
- countermeasures
- cyber attacks
- product recommendation
- dynamic programming