Login / Signup

Selecting transition process for WLAN security.

Shih-Feng HsuYi-Bing Lin
Published in: Wirel. Commun. Mob. Comput. (2008)
Keyphrases
  • intrusion detection
  • information security
  • database
  • neural network
  • decision making
  • access control
  • quality of service
  • ad hoc networks