Login / Signup
Selecting transition process for WLAN security.
Shih-Feng Hsu
Yi-Bing Lin
Published in:
Wirel. Commun. Mob. Comput. (2008)
Keyphrases
</>
intrusion detection
information security
database
neural network
decision making
access control
quality of service
ad hoc networks