Keyphrases
- malicious nodes
- social networks
- malicious users
- secure routing
- security threats
- wireless sensor networks
- security mechanisms
- security problems
- network nodes
- security measures
- java card
- security protocols
- ad hoc networks
- social network analysis
- denial of service attacks
- security issues
- countermeasures
- routing protocol
- security flaws
- cyber attacks
- security vulnerabilities
- mobile agent system
- security risks
- access control
- computer security
- spectrum sensing
- inter domain
- ad hoc networking
- stream cipher
- information security
- mobile networks
- security breaches
- cryptographic protocols
- online social networks
- key management
- security requirements
- mobile devices
- network layer
- social networking
- biometric template
- computer networks
- chosen plaintext
- detection mechanism
- malware detection
- dos attacks
- mobile ad hoc networks
- security policies
- buffer overflow
- mobile users
- defense mechanisms
- shortest path