Sign in

R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks.

Dimitrios ZorbasPanayiotis KotzanikolaouChristos Douligeris
Published in: ISCC (2018)
Keyphrases
  • complex networks
  • social networks
  • network analysis
  • wireless lan
  • intelligent agent technology
  • network structure
  • computer networks
  • critical infrastructure
  • network size