RA-inspired codes for efficient information theoretic multi-path network security.
Tao YeDarryl VeitchSarah JohnsonPublished in: ISITA (2014)
Keyphrases
- information theoretic
- network security
- multipath
- information theory
- mutual information
- intrusion detection
- theoretic framework
- computer networks
- intrusion detection system
- information bottleneck
- traffic analysis
- information theoretic measures
- routing algorithm
- information security
- mobile ad hoc networks
- feature selection
- network traffic
- kullback leibler divergence