Login / Signup

Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information.

Monika DarjiBhushan H. Trivedi
Published in: SSCC (2014)
Keyphrases
  • information sources
  • detection method
  • mobile devices
  • end users
  • information sharing
  • false alarms
  • countermeasures
  • position information
  • portable devices