Login / Signup
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems.
Hoda Jannati
Published in:
Int. J. Crit. Infrastructure Prot. (2015)
Keyphrases
</>
fraud detection
real time
decision making
context aware
intrusion detection
social network analysis