4.7 Article

Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Integrity Regions: Authentication through Presence in Wireless Networks

Srdjan Capkun et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Computer Science, Theory & Methods

Of malicious motes and suspicious sensors On the efficiency of malicious interference in wireless networks

Seth Gilbert et al.

THEORETICAL COMPUTER SCIENCE (2009)

Article Computer Science, Information Systems

Wormhole-based antijamming techniques in sensor networks

Mario Cagalj et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)

Proceedings Paper Computer Science, Information Systems

Keyless jam resistance

Leemon C. Baird et al.

2007 IEEE INFORMATION ASSURANCE WORKSHOP (2007)

Article Engineering, Electrical & Electronic

An evolutionary approach to designing complex spreading codes for DS-CDMA

B Natarajan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2005)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)