Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks.
Chunxiao ChiganLeiyuan LiYinghua YePublished in: IET Inf. Secur. (2007)
Keyphrases
- security issues
- security requirements
- information security
- security policies
- network security
- cloud computing
- information assurance
- functional requirements
- intrusion detection
- quality of service
- access control
- security systems
- data sets
- security analysis
- data security
- security level
- security properties
- security threats
- security measures
- database