|
Volumn , Issue , 2010, Pages 202-207
|
An intrusion detection architecture for clustered wireless ad hoc networks
|
Author keywords
Cluster; Denial of service attack; Intrusion detection; Security; Wireless ad hoc networks
|
Indexed keywords
CLUSTER;
CLUSTER HEAD;
CLUSTER-HEADS;
COOPERATIVE ALGORITHM;
COOPERATIVE INTRUSION DETECTION;
DENIAL OF SERVICE ATTACKS;
DISTRIBUTED INTRUSION DETECTION;
INTRUSION DATA;
MESSAGE COMMUNICATION;
MONITORING POINTS;
PROPOSED ARCHITECTURES;
SECURITY;
SECURITY VULNERABILITIES;
SIMULATION RESULT;
WIRELESS COMMUNICATIONS;
ARTIFICIAL INTELLIGENCE;
CLUSTER COMPUTING;
COMMUNICATION SYSTEMS;
COMPUTER CRIME;
INTELLIGENT AGENTS;
INTRUSION DETECTION;
MOBILE AGENTS;
NETWORK ARCHITECTURE;
NETWORK PROTOCOLS;
TOPOLOGY;
TRANSMISSION CONTROL PROTOCOL;
WIRELESS AD HOC NETWORKS;
WIRELESS TELECOMMUNICATION SYSTEMS;
AD HOC NETWORKS;
|
EID: 78649811349
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CICSyN.2010.51 Document Type: Conference Paper |
Times cited : (25)
|
References (16)
|