Author:
Benslimen Yosra,Sedjelmaci Hichem,Manenti Ana-Cristina
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference23 articles.
1. NGMN (2015) 5G white Paper. Technical report
2. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15
3. Kbar G (2009) Security risk analysis based on probability of system failure, attacks and vulnerabilities, pp 874–879
4. Abhishek NV, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM international symposium on qos and security for wireless and mobile networks, series (Q2SWinet’18). Association for Computing Machinery, New York, NY, USA, p 16
5. Sriram VSS, Sahoo G, Agrawal KK (2010) Detecting and eliminating rogue access points in ieee-802.11 WLAN—a multi-agent sourcing methodology. In: 2010 IEEE 2nd international advance computing conference (IACC), pp 256–260
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献