Login / Signup
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication.
Misbah Shafi
Rakesh Kumar Jha
Published in:
CoRR (2021)
Keyphrases
</>
image registration
countermeasures
detection mechanism
malicious users
multi agent
d objects
malicious attacks
power analysis
real time
genetic algorithm
computer networks
information exchange
denial of service attacks
attack detection
data corruption