Securing MANETs with BITSI: danger theory and mission continuity.
Marco CarvalhoRichard FordWilliam H. AllenGerald A. MarinPublished in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2008)
Keyphrases
- mobile ad hoc networks
- routing protocol
- peer to peer
- ad hoc networks
- service discovery
- multi hop
- routing algorithm
- cyber defense
- image processing
- mission planning
- information security
- space shuttle
- artificial intelligence
- topology control
- network topology
- information retrieval
- mobile nodes
- data transmission
- image sequences
- wireless medium