Mostrando 3 resultados de: 3
Filtros aplicados
Subtipo de publicación
Article(3)
Área temáticas
Física aplicada(2)
Programación informática, programas, datos, seguridad(2)
Ciencias de la computación(1)
Criminología(1)
Economía financiera(1)
Origen
google(3)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopus