Login / Signup
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes.
Nadav Schweitzer
Ariel Stulman
Asaf Shabtai
Roy David Margalit
Published in:
IEEE Trans. Mob. Comput. (2016)
Keyphrases
</>
denial of service attacks
end hosts
dos attacks
intrusion detection system
topology control
security threats
ddos attacks
network security
mobile ad hoc networks
mobile nodes
routing protocol
ad hoc networks
wireless sensor networks
databases
intrusion detection
data processing
web services