Keyphrases
- ad hoc networks
- cross layer
- intrusion detection system
- routing protocol
- distributed intrusion detection
- wireless networks
- mobile ad hoc networks
- wireless ad hoc networks
- computer networks
- quality of service
- intrusion detection
- network topology
- peer to peer
- mac layer
- routing algorithm
- network security
- qos requirements
- mac protocol
- multi hop
- anomaly detection
- video streaming
- end to end
- key management
- network traffic
- wireless sensor networks
- sensor networks
- base station
- distributed systems
- energy consumption
- distributed computing
- data transmission
- multimedia services
- wireless communication
- end to end delay
- mobile agents
- mobile networks
- ip networks
- application layer
- wireless mesh networks
- energy efficient
- wireless link
- communication networks
- web services
- information security
- response time
- data management
- data mining techniques
- metadata