Login / Signup

Control of Multi-Hop Wireless Networks with Security Constraints.

Qiuming LiuLi YuJun Zheng
Published in: VTC Fall (2017)
Keyphrases
  • information security
  • physical layer
  • intrusion detection
  • low cost
  • computational complexity