Login / Signup
Layered security design for mobile ad hoc networks.
Nikos Komninos
Dimitris Vergados
Christos Douligeris
Published in:
Comput. Secur. (2006)
Keyphrases
</>
design process
design methodology
case study
user interface
real time
functional requirements
data mining
intrusion detection