Login / Signup

Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation.

Ashraf AbdelhamidMahmoud Said ElsayedHeba K. AslanMarianne A. Azer
Published in: ARES (2024)
Keyphrases
  • anomaly detection
  • anomaly based intrusion detection
  • countermeasures
  • databases
  • neural network
  • pattern recognition
  • data analysis
  • risk management
  • secret key
  • block cipher
  • malicious users
  • key exchange protocol