Login / Signup
Detecting man-in-the-middle attacks on non-mobile systems.
Visa Antero Vallivaara
Mirko Sailio
Kimmo Halunen
Published in:
CODASPY (2014)
Keyphrases
</>
network intrusion detection systems
management system
mobile devices
autonomous mobile
expert systems
context aware
intrusion detection
data sets
data mining
distributed systems
computer systems
learning systems
intrusion detection system
mobile applications
communication technologies
intrusion prevention