Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
Information Technology Journal(1)
KSII Transactions on Internet and Information Systems(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopus