Login / Signup
Detecting and avoiding wormhole attacks in wireless ad hoc networks.
Farid Naït-Abdesselam
Brahim Bensaou
Tarik Taleb
Published in:
IEEE Commun. Mag. (2008)
Keyphrases
</>
network intrusion detection systems
countermeasures
automatic detection
misuse detection
detect malicious
denial of service attacks
malicious activities
detecting malicious
database
genetic algorithm
intrusion detection
watermarking scheme
image watermarking
network intrusion
malicious users