Login / Signup
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls.
Jun Cheol Park
Sneha Kumar Kasera
Published in:
WCNC (2007)
Keyphrases
</>
data collection
data mining techniques
computer systems
missing data
original data
data sources
injection attacks
information systems