Sign in

An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks.

Christoforos PanosChristos XenakisIoannis Stavrakakis
Published in: TrustBus (2011)
Keyphrases
  • neural network
  • machine learning
  • feature extraction
  • support vector machine
  • routing protocol
  • evaluation method
  • evaluation model