Login / Signup

A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.

Masaki NaritaBhed Bahadur BistaToyoo Takata
Published in: Int. J. Space Based Situated Comput. (2013)
Keyphrases
  • noise tolerant
  • countermeasures
  • feature selection
  • feature extraction
  • training set
  • noise tolerance