Author:
Brown J. David,Salmanian Mazda,Willink Tricia J.
Publisher
Springer International Publishing
Reference22 articles.
1. Vanhoef, M., Piessens, F.: Advanced WiFi attacks using commodity hardware. In: Proceedings of 2014 Annual Computer Security Applications Conference, New Orleans LA, USA (2014)
2. Eisen, J., Watson, S., Willink, T.: Location constrained jamming: surgical link removal using local graph partitioning. In: Proceedings of 2018 International Conference on Military Communications and Information Systems (ICMCIS), Warsaw, Poland (2018)
3. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, USA (2003)
4. Puray, M., Palod, P.: Black-hole attack in MANET: a study. Int. J. Adv. Res. Comput. Eng. Technol. 5(3) (2016)
5. Jin, X., Ken Yiu, W.P., Gary Chan, S.H., Wang, Y.: Network topology inference based on end-to-end measurements. IEEE J. Sel. Areas Commun. 24(12), 2182–2195 (2006)