Login / Signup

A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time.

Komang Oka SaputraWei-Chung TengYi-Hao Chu
Published in: WI-IAT (3) (2015)
Keyphrases
  • product recommendation
  • attack detection
  • attack scenarios
  • distributed databases
  • high speed
  • power consumption
  • lightweight
  • control system
  • peer to peer
  • intrusion detection