Login / Signup
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
Santhanakrishnan Anand
Shamik Sengupta
Kai Hong
K. P. Subbalakshmi
Rajarathnam Chandramouli
Hasan Cam
Published in:
IEEE Trans. Veh. Technol. (2014)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
security properties
data mining
data access
attack graphs