Login / Signup

ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION.

Yongjin Kim
Published in: ISA (2009)
Keyphrases
  • abnormality detection
  • mac layer
  • cross layer
  • network simulator
  • mac protocol