Login / Signup
Design and Analysis of Secure Localization Against Vulnerability-Induced Attack for Internet of Things.
Guanghui Wang
Xiaolin Huang
Xueyuan Zhang
Geyuan Liu
Fang Zuo
Published in:
ICCC Workshops (2023)
Keyphrases
</>
case study
key technologies
data analysis
mobile devices
statistical analysis
security analysis
attack detection