@dblp

A comparative evaluation of intrusion detection architectures for mobile ad hoc networks.

, , and . Computers & Security, 30 (1): 63-80 (2011)

Links and resources

Tags