Attack Detection for Resource-Constrained Network Devices.
HongQian Karen LuPublished in: ICONS (2008)
Keyphrases
- resource constrained
- attack detection
- network devices
- multistage
- network management
- intrusion detection system
- wireless sensor networks
- sensor networks
- security mechanisms
- resource constraints
- network topology
- cyber attacks
- multipath
- product recommendation
- intrusion detection
- sensor nodes
- rfid tags
- internet protocol
- base station
- real time
- embedded systems
- energy consumption
- data mining