A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
Yingfang FuJingsha HeLiangyu LuanGuorui LiRong WangPublished in: KES-AMSTA (2008)
Keyphrases
- intrusion detection
- key management scheme
- intrusion detection system
- anomaly detection
- key management
- network security
- high detection rate
- information security
- data mining
- network traffic
- network intrusion detection
- detecting anomalous
- wireless sensor networks
- network intrusion
- ad hoc networks
- computer networks
- routing protocol
- data mining techniques
- machine learning
- alert correlation
- intrusion prevention