Resource-aware self-adaptive security provisioning in mobile ad hoc networks.
Chunxiao ChiganLeiyuan LiYinghua YePublished in: WCNC (2005)
Keyphrases
- information security
- security issues
- intrusion detection
- security requirements
- computer security
- security mechanisms
- resource management
- statistical databases
- access control
- security problems
- security analysis
- functional requirements
- security policies
- service discovery
- cloud computing
- network security
- quality of service
- security systems
- security level
- database
- security management
- wired networks