Login / Signup

Full-Duplexing Jamming Attack for Active Eavesdropping.

Jinho Choi
Published in: ICITCS (2016)
Keyphrases
  • countermeasures
  • real time
  • learning algorithm
  • decision making
  • secret key
  • attack detection
  • malicious users