Keyphrases
Selfish Nodes
90%
Malware Detection
81%
Optimal Algorithm
75%
Prover
75%
Hyperplane
68%
Reputation-based
65%
Time Algorithm
62%
Mobile Malware
62%
Line Segments
61%
Cluster-based
60%
Quality of Service
59%
Network Lifetime
57%
Optimized Link State Routing
56%
Tit-for-tat Strategy
56%
Line Transversals
56%
Polygon
56%
Separation Problem
53%
Ad Hoc Networks
50%
Approximation Algorithms
46%
Wireless Networks
43%
Distance Bounding Protocol
43%
Smartphone
40%
Multipoint Relay
39%
Relay Node
38%
Simple Objects
37%
Linear Approximation
37%
Stab
37%
Disjoint
37%
Combinatorial Bounds
37%
Radius Problems
37%
Bounded Curvature
37%
Private Channel
37%
Transversal Problem
37%
Terrorist Fraud
37%
Transmitter
37%
Filter Method
37%
Non-cooperative Transmitter
37%
IEEE 802.11
37%
Bipartite Graph
37%
System Call Filtering
37%
Abstraction Process
37%
CSMA-CA
37%
Detection Performance
37%
Wireless Ad-hoc Networks (WANETs)
37%
OLSR Protocol
37%
Verifier
35%
Watchdog
32%
Network Services
32%
Convex Polygon
31%
Hypersphere
28%
Computer Science
selfish node
100%
Malware Detection
81%
Approximation (Algorithm)
78%
Malware
68%
Routing Protocol
60%
Quality of Service
59%
Network Lifetime
59%
System Call
56%
Link State Routing Protocol
56%
ad-hoc network
50%
Authentication Protocol
49%
Anonymity
46%
Residual Energy
46%
Wireless Network
46%
Private Channel
37%
IEEE 802.11
37%
Bipartite Graph
37%
Detection Performance
37%
wireless ad hoc network
37%
Android
35%
Machine Learning
35%
Learning System
35%
cluster-head
32%
Authentication
31%
Time Complexity
28%
Intrusion Detection System
28%
Signal Strength
28%
Space Complexity
28%
Wireless Communication
28%
Geometric Interpretation
28%
Transmission Error
24%
group signature
24%
Selection Process
23%
Wormhole Attack
22%
Network Resource
21%
Connectivity Index
21%
Clustering Algorithm
21%
Authentication Credential
18%
Malicious Attack
18%
provably secure
18%
public key
18%
Dependent Object
18%
Control Infrastructure
18%
Proof System
18%
Computer Worms
18%
Anomaly-Based Detection
18%
secure multiparty computation
18%
Received Information
18%
Access Link
18%
Detection Mechanism
18%