Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs.
Alberto AvritzerRobert G. ColeElaine J. WeyukerPublished in: WOSP (2007)
Keyphrases
- mobile ad hoc networks
- routing protocol
- signature verification
- signature recognition
- service discovery
- anti virus
- peer to peer
- countermeasures
- multi hop
- command and control
- data dissemination
- risk management
- network traffic
- computer security
- computer viruses
- air combat
- information retrieval
- malware detection
- ad hoc networks
- mobile phone
- real time strategy games