Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2009). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security, 190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...
Romdhani, I., & Al-Dubai, A. (2007). A multi-channel hybrid MAC protocol for wireless Mesh networks. In Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey