Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security.
Hind IdrissiPublished in: Wirel. Pers. Commun. (2017)
Keyphrases
- intrusion detection
- mobile agents
- elliptic curve cryptography
- mobile agent system
- security analysis
- intrusion detection system
- network security
- information security
- anomaly detection
- security mechanisms
- security requirements
- network traffic
- network management
- network intrusion detection
- computer security
- cyber security
- distributed systems
- trusted platform module
- distributed intrusion detection
- fault tolerance
- security vulnerabilities
- agent technology
- intelligent agents
- mobile computing
- computing environments
- peer to peer
- elliptic curve
- dos attacks
- security issues
- access control
- data mining techniques
- mobile users
- authentication protocol
- public key cryptography
- cyber attacks
- computational intelligence
- computer networks
- public key
- intrusion prevention
- malicious code detection
- databases
- security properties
- alert correlation
- information systems
- machine learning