Login / Signup
Exploiting the Network for Securing Personal Devices.
Chris Dalton
Antonio Lioy
Diego R. López
Fulvio Risso
Roberto Sassu
Published in:
CSP Forum (2014)
Keyphrases
</>
network model
complex networks
network traffic
social networks
wireless sensor networks
computer networks
communication infrastructure
data sets
user interface
peer to peer
network structure
information security
wireless technologies
network topologies
network size
physical objects