Y Liu, Y Li, H Man - Proceedings from the Sixth Annual IEEE …, 2005 - ieeexplore.ieee.org
It is evident that traditional end-to-end intrusion detection mechanisms developed on
wireless local area networks (WLANs) and wired networks are no longer sufficient for breach …