Keyphrases
- countermeasures
- security vulnerabilities
- information security
- intrusion detection
- sql injection
- dos attacks
- wireless networks
- mobile ad hoc networks
- security properties
- penetration testing
- mobile devices
- power analysis
- mobile users
- attack graphs
- intrusion detection system
- security measures
- information systems
- network security
- mobile networks
- security requirements
- databases
- unauthorized access
- cyber attacks
- data mining
- real world