Applying Mobile Agent to Intrusion Response for Ad Hoc Networks.
Ping YiYiPing ZhongShiyong ZhangPublished in: International Conference on Computational Science (2) (2005)
Keyphrases
- ad hoc networks
- mobile agents
- network topology
- routing protocol
- wireless ad hoc networks
- client server
- wireless networks
- peer to peer
- network nodes
- end to end
- multi hop
- routing algorithm
- distributed computing
- load balancing
- intrusion detection
- mobile ad hoc networks
- quality of service
- mobile agent system
- mobile agent technology
- computing environments
- fault tolerance
- key management
- agent technology
- wifi
- distributed systems
- network management
- intelligent agents
- mobile networks
- base station
- mobile users
- network infrastructure
- mobile computing
- wireless mesh networks
- anomaly detection
- intrusion detection system
- artificial intelligence