Login / Signup
Countering Intelligent Jamming with Full Protocol Stack Agility.
Cherita L. Corbett
Jason Uher
Jarriel Cook
Angela Dalton
Published in:
IEEE Secur. Priv. (2014)
Keyphrases
</>
protocol stack
wireless communication
communication protocols
supply chain
tcp ip
embedded systems
software systems
business process
artificial intelligence
case study
response time
quality of service
agent technology
competitive advantage