Login / Signup
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Jie Yang
Yingying Chen
Wade Trappe
Jay Cheng
Published in:
INFOCOM (2009)
Keyphrases
</>
data mining
data sets
cooperative
computational complexity
mobile networks
fixed number
maximum number
ddos attacks
mobile communication
malicious attacks