Login / Signup
Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation.
Ashraf Abdelhamid
Mahmoud Said Elsayed
Heba K. Aslan
Marianne A. Azer
Published in:
ARES (2024)
Keyphrases
</>
anomaly detection
anomaly based intrusion detection
countermeasures
databases
neural network
pattern recognition
data analysis
risk management
secret key
block cipher
malicious users
key exchange protocol