Login / Signup

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.

Jie YangYingying ChenWade TrappeJay Cheng
Published in: INFOCOM (2009)
Keyphrases
  • data mining
  • data sets
  • cooperative
  • computational complexity
  • mobile networks
  • fixed number
  • maximum number
  • ddos attacks
  • mobile communication
  • malicious attacks