Login / Signup
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers.
Saeed Ur Rehman
Kevin W. Sowerby
Colin Coghill
Published in:
J. Comput. Syst. Sci. (2014)
Keyphrases
</>
low end
high end
computer systems
motion estimation