Hello,
Im currently looking into detecting intrusion within ad-hoc networks.
Has anybody used NS2 before to simulate a network being intruded upon?
 
Regards
Karun Dambiec
 
--
[EMAIL PROTECTED]

Reply via email to