Login / Signup

Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers.

Saeed Ur RehmanKevin W. SowerbyColin Coghill
Published in: J. Comput. Syst. Sci. (2014)
Keyphrases
  • low end
  • high end
  • computer systems
  • motion estimation