Login / Signup
How to obfuscate execution of protocols in an ad hoc radio network?
Marcin Kardas
Marek Klonowski
Piotr Syga
Published in:
Ad Hoc Networks (2019)
Keyphrases
</>
data flow
peer to peer
communication protocol
complex networks
network model
cognitive radio
network management
network protocols
wireless sensor networks
anomaly detection
computer networks
wireless communication
application level