Keyphrases
Abstraction Process
37%
Ad Hoc Networks
50%
Approximation Algorithms
46%
Bipartite Graph
37%
Bounded Curvature
37%
Cluster-based
60%
Combinatorial Bounds
37%
Convex Polygon
31%
CSMA-CA
37%
Detection Performance
37%
Disjoint
37%
Distance Bounding Protocol
43%
Filter Method
37%
Hyperplane
68%
Hypersphere
28%
IEEE 802.11
37%
Line Segments
61%
Line Transversals
56%
Linear Approximation
37%
Malware Detection
81%
Mobile Malware
62%
Multipoint Relay
39%
Network Lifetime
57%
Network Services
32%
Non-cooperative Transmitter
37%
OLSR Protocol
37%
Optimal Algorithm
75%
Optimized Link State Routing
56%
Polygon
56%
Private Channel
37%
Prover
75%
Quality of Service
59%
Radius Problems
37%
Relay Node
38%
Reputation-based
65%
Selfish Nodes
90%
Separation Problem
53%
Simple Objects
37%
Smartphone
40%
Stab
37%
System Call Filtering
37%
Terrorist Fraud
37%
Time Algorithm
62%
Tit-for-tat Strategy
56%
Transmitter
37%
Transversal Problem
37%
Verifier
35%
Watchdog
32%
Wireless Ad-hoc Networks (WANETs)
37%
Wireless Networks
43%
Computer Science
Access Link
18%
ad-hoc network
50%
Android
35%
Anomaly-Based Detection
18%
Anonymity
46%
Approximation (Algorithm)
78%
Authentication
31%
Authentication Credential
18%
Authentication Protocol
49%
Bipartite Graph
37%
cluster-head
32%
Clustering Algorithm
21%
Computer Worms
18%
Connectivity Index
21%
Control Infrastructure
18%
Dependent Object
18%
Detection Mechanism
18%
Detection Performance
37%
Geometric Interpretation
28%
group signature
24%
IEEE 802.11
37%
Intrusion Detection System
28%
Learning System
35%
Link State Routing Protocol
56%
Machine Learning
35%
Malicious Attack
18%
Malware
68%
Malware Detection
81%
Network Lifetime
59%
Network Resource
21%
Private Channel
37%
Proof System
18%
provably secure
18%
public key
18%
Quality of Service
59%
Received Information
18%
Residual Energy
46%
Routing Protocol
60%
secure multiparty computation
18%
Selection Process
23%
selfish node
100%
Signal Strength
28%
Space Complexity
28%
System Call
56%
Time Complexity
28%
Transmission Error
24%
wireless ad hoc network
37%
Wireless Communication
28%
Wireless Network
46%
Wormhole Attack
22%