Sign in

Attacks and Countermeasures on 802.16: Analysis and Assessment.

Constantinos KoliasGeorgios KambourakisStefanos Gritzalis
Published in: IEEE Commun. Surv. Tutorials (2013)
Keyphrases
  • countermeasures
  • information security
  • security measures
  • java card
  • risk assessment
  • information systems
  • cyber attacks
  • power analysis
  • data mining
  • machine learning
  • rural areas