Login / Signup
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack.
Waqas Aman
Zeeshan Haider
Syed Waqas Haider Shah
Muhammad Mahboob Ur Rahman
Octavia A. Dobre
Published in:
ICC (2020)
Keyphrases
</>
underwater acoustic
security analysis
data sets
sensor networks
authentication protocol