Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks.
Shengrong BuF. Richard YuXiaoping P. LiuHelen TangPublished in: IEEE Trans. Wirel. Commun. (2011)
Keyphrases
- intrusion detection
- user authentication
- high security
- security analysis
- mobile ad hoc networks
- information security
- image encryption
- authentication scheme
- intrusion detection system
- security requirements
- anomaly detection
- network security
- routing protocol
- network traffic
- authentication protocol
- public key
- ad hoc networks
- smart card
- network topology
- multipath
- data mining
- encryption scheme
- data mining techniques