Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
Zhuo LuWenye WangCliff WangPublished in: IEEE Trans. Mob. Comput. (2014)
Keyphrases
- object detection
- detection algorithm
- detection accuracy
- wireless networks
- false alarms
- mobile devices
- attack detection
- countermeasures
- detection method
- detection rate
- wireless communication
- false positives
- anomaly detection
- decision theoretic
- emergency response
- ddos attacks
- image watermarking
- video sequences
- network attacks
- normal traffic