Login / Signup

A Study on Detection Method of Selfish Terminal Using Manipulated MAC Parameters over WLAN.

Hiroyasu ObataChisa TakanoKenji Ishida
Published in: CANDAR (2015)
Keyphrases
  • detection method
  • face detection
  • detection algorithm
  • resource allocation
  • saliency detection