Keyphrases
- dos attacks
- denial of service
- multi objective
- network security
- denial of service attacks
- security vulnerabilities
- control system
- cyber attacks
- lightweight
- control method
- fault tolerant control
- ddos attacks
- evolutionary algorithm
- mobile ad hoc networks
- intrusion detection
- multi objective optimization
- intrusion detection system
- fault injection
- genetic algorithm
- computer networks
- control strategy
- security policies
- network traffic
- active control
- security measures
- security threats
- peer to peer
- access control
- cloud computing
- security issues
- mobile agents
- closed loop
- data mining