Using Battery Constraints within Mobile Hosts to Improve Network Security.
Grant A. JacobyRandy C. MarchanyNathaniel J. Davis IVPublished in: IEEE Secur. Priv. (2006)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- dos attacks
- risk assessment
- network traffic
- security policies
- security protection
- situation assessment
- security breaches
- anti phishing
- network administrators
- network intrusion
- denial of service
- computer security
- constraint satisfaction