Login / Signup

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls.

Jun Cheol ParkSneha Kumar Kasera
Published in: WCNC (2007)
Keyphrases
  • data collection
  • data mining techniques
  • computer systems
  • missing data
  • original data
  • data sources
  • injection attacks
  • information systems