Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization.
Abdulhamid AdebayoDanda B. RawatPublished in: CCNC (2020)
Keyphrases
- wireless networks
- network access
- cyber security
- wireless communication
- cyber defense
- wireless local area network
- security policies
- cloud computing
- cyber crime
- intrusion detection
- mobile computing
- cellular networks
- ad hoc networks
- base station
- information security
- multi hop
- low bandwidth
- security issues
- wireless networking
- key management
- mobile communications
- cross layer
- network security
- network infrastructure
- high availability
- wifi
- operating system
- communication links
- virtual machine
- link layer
- cooperative
- intrusion detection system