An efficient intrusion detection in resource-constrained mobile ad-hoc networks.
Myria BouhaddiMohammed Said RadjefKamel AdiPublished in: Comput. Secur. (2018)
Keyphrases
- intrusion detection
- resource constrained
- mobile ad hoc networks
- multipath
- intrusion detection system
- wireless sensor networks
- routing protocol
- anomaly detection
- sensor networks
- resource constraints
- network security
- end to end
- network intrusion detection
- network traffic
- data mining
- ad hoc networks
- network topology
- mobile networks
- detecting anomalous
- sensor nodes
- routing algorithm
- data mining techniques
- data sets
- energy consumption
- digital libraries
- data streams
- genetic algorithm
- network attacks