Login / Signup
Mobile adhoc networks: A simulation based security evaluation and intrusion prevention.
Maitha Salem Al Mazrouei
Sundaravalli Narayanaswami
Published in:
ICITST (2011)
Keyphrases
</>
intrusion prevention
intrusion detection
anomaly detection
intrusion detection system
mobile commerce
real world
learning algorithm
training data
information security
network security
mobile applications
security policies
statistical databases
security requirements