Login / Signup
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.
Masaki Narita
Bhed Bahadur Bista
Toyoo Takata
Published in:
Int. J. Space Based Situated Comput. (2013)
Keyphrases
</>
noise tolerant
countermeasures
feature selection
feature extraction
training set
noise tolerance