Keyphrases
- dos attacks
- forensic analysis
- ddos attacks
- mobile ad hoc networks
- denial of service
- denial of service attacks
- routing protocol
- security vulnerabilities
- ip address
- ad hoc networks
- flow analysis
- network security
- network topology
- mobile users
- traffic data
- lightweight
- peer to peer
- digital forensics
- image sequences
- context aware
- aodv routing protocol