Login / Signup

Layered security design for mobile ad hoc networks.

Nikos KomninosDimitris VergadosChristos Douligeris
Published in: Comput. Secur. (2006)
Keyphrases
  • design process
  • design methodology
  • case study
  • user interface
  • real time
  • functional requirements
  • data mining
  • intrusion detection