Login / Signup
Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures.
Szymon Szott
Jerzy Konorski
Published in:
CoRR (2017)
Keyphrases
</>
countermeasures
information security
power analysis
java card
security measures
cyber attacks
rural areas
case study
smart card
data mining
quality of service
computer networks
cellular networks