Login / Signup
A Study on Detection Method of Selfish Terminal Using Manipulated MAC Parameters over WLAN.
Hiroyasu Obata
Chisa Takano
Kenji Ishida
Published in:
CANDAR (2015)
Keyphrases
</>
detection method
face detection
detection algorithm
resource allocation
saliency detection