Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference40 articles.
1. Khan, A., “Hacking the Drones ", Netherlands April 21st, OWASP. available online: https://www.owasp.org/index.php/ Netherlands_April_21st, 2016.
2. Agarwal, M., Purwar, S., Biswa, S., & Nandi, S. (2017). Intrusion detection system for PS-Poll DoS attack under 802.11 networks using real time discrete event system. IEEE/CAA Journal of Automatica Sinica, 4(4), 792–808.
3. Aminanto, M., Choi, R., Tanuwidjaja, H., Yoo, P., & Kim, K. (2018). Deep abstraction & weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics & Security, 13(3), 621–636.
4. Seeger, B (2017). "Dynamic not only has the engine mattered! complex event processing", Available online : https://db.under.tum.de/hosted/scalableanalytics/presentations/CEP_Dynamic.Pdf, as on 10.11.2017 .
5. Buhov, D., Huber, M., Merzdovnik, G., Weippl, E. (2016). Pin it! Improving android network security at runtime, IFIP Networking Conference (IFIP Networking) & Workshops, Vienna, pp. 297–305,
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献