... e. g. security threats and detection techniques (Fragkiadakis et al 2012) or control channel security (Safdar et al 2009). ... CN is a network can dynamically adapt its operational parameters in response to user and service needs or changing ... enable the vision of pervasive computing, seamless mobility, ad-hoc networks, and dynamic spectrum allocation, among others. ... Manual configuration also provides a higher risk for misconfiguration and may take too much time to redeployanbsp;...
|Title||:||ECIW2012- 11th European Conference on Information warfare and security|
|Publisher||:||Academic Conferences Limited - 2012|