Showing 1 - 2 results of 2 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Ghathwan, Khalil Ibrahim
    Published 2016
    ...Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks...
    Get full text
    Get full text
    Thesis
  2. 2
    by Rasheed, Mohammad M.
    Published 2012
    ... instead of anomaly-based technology. Signature-based technology can only detect known attacks...
    Get full text
    Get full text
    Thesis