Skip to main navigation
Skip to search
Skip to main content
University of Arizona Home
Home
Profiles
Departments and Centers
Scholarly Works
Activities
Grants
Datasets
Prizes
Search by expertise, name or affiliation
Anomaly-based behavior analysis of wireless network security
Samer Fayssal
,
Salim Hariri
, Youssif Al-Nashif
Electrical and Computer Engineering
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
32
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Anomaly-based behavior analysis of wireless network security'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Security Rules
75%
Wireless Attacks
75%
Protection System
75%
Monitoring Analysis
25%
Anomaly Threshold
25%
Network Features
25%
State Tracking
25%
Network Security Management
25%
Feature Tracks
25%
State Machine
25%
Attack Impact
25%
Normative Analysis
25%
Genetic Search
25%
Denial-of-service Attack
25%
Exponential Growth
25%
Multichannel Monitoring
25%
Adaptive Machine Learning
25%
Wireless Local Area Network
25%
Search-as-learning
25%
Static Security
25%
Network Fault
25%
Security Vulnerabilities
25%
Security Measures
25%
Packet Analysis
25%
Expert Knowledge
25%
Computer Science
Wireless Network Security
100%
Wireless Attack
60%
Security Vulnerability
20%
wireless local area network
20%
Denial of Service Attack
20%
Security Measure
20%
Security Management
20%
Final Decision
20%
Exponential Growth
20%
Expert Knowledge
20%
Packet Analysis
20%