4.7 Article

Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Integrity Regions: Authentication through Presence in Wireless Networks

Srdjan Capkun et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Computer Science, Theory & Methods

Of malicious motes and suspicious sensors On the efficiency of malicious interference in wireless networks

Seth Gilbert et al.

THEORETICAL COMPUTER SCIENCE (2009)

Article Computer Science, Information Systems

Wormhole-based antijamming techniques in sensor networks

Mario Cagalj et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)

Proceedings Paper Computer Science, Information Systems

Keyless jam resistance

Leemon C. Baird et al.

2007 IEEE INFORMATION ASSURANCE WORKSHOP (2007)

Article Engineering, Electrical & Electronic

An evolutionary approach to designing complex spreading codes for DS-CDMA

B Natarajan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2005)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)