2011
DOI: 10.5121/ijnsa.2011.3603
|View full text |Cite
|
Sign up to set email alerts
|

The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…This method is similar to how the antivirus software to identify and protect the system against threats [10]. There is also the IDS that works by detecting based on a comparison of average traffic patterns that exist and then look for abnormalities of existing traffic.…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%
“…This method is similar to how the antivirus software to identify and protect the system against threats [10]. There is also the IDS that works by detecting based on a comparison of average traffic patterns that exist and then look for abnormalities of existing traffic.…”
Section: B Intrusion Detection Systemmentioning
confidence: 99%