Keyphrases
Challenge-based
100%
Collaborative Intrusion Detection Networks
100%
On-off Attack
100%
Insider Attack
28%
Intrusion Detection System
28%
Copyright
14%
Motivation
14%
International Publishing
14%
Trustworthiness
14%
Network Environment
14%
Collecting Information
14%
Network Node
14%
Malicious Node
14%
System Node
14%
Trust-based Mechanism
14%
Trust Computation
14%
Threat Model
14%
Challenge-based Trust Mechanism
14%
Attack Performance
14%
Practical Deployment
14%
Communicated Information
14%
Computer Science
network intrusion detection
100%
Intrusion Detection System
33%
Insider Attack
33%
Experimental Result
16%
Network Environment
16%
Collecting Information
16%
Intrusion Detection
16%
Threat Model
16%