Detecting Misreporting Attacks to the Proportional Fair Scheduler.
Jorge F. SchmidtRoberto López-ValcarcePublished in: WIFS (2014)
Keyphrases
- countermeasures
- network intrusion detection systems
- security protocols
- neural network
- detect malicious
- terrorist attacks
- inversely proportional
- watermarking method
- computer security
- automatic detection
- data sets
- digital watermarking
- ddos attacks
- scheduling algorithm
- denial of service attacks
- malicious attacks
- intrusion detection system
- malicious activities
- response time