Login / Signup
Analysis on Manipulation of the MAC Address and Consequent Security Threats.
Kyungroul Lee
Hyeungjun Yeuk
Kangbin Yim
Suhyun Kim
Published in:
MIST@CCS (2016)
Keyphrases
</>
security threats
real time
data sets
data mining
web services
data analysis
wireless sensor networks
low cost