Login / Signup
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks.
Farah I. Kandah
Yashaswi Singh
Weiyi Zhang
Chonggang Wang
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
monitoring system
model checking
real time
countermeasures
formal verification
ddos attacks
qos routing
functional verification
data mining
data acquisition
face verification
detection mechanism
verification method
attack detection