1. Cross-layer design for wireless networks;Shakkottai S;IEEE Communications Magazine,2003
2. Guennoun, M., Lbekkouri, A., Benamrane, A., Ben-Tahir, M., & El-Khatib, K. (2008). Wireless networks security: Proof of chopchop attack,2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, pp. 1–4.
3. Gupta, & Jha, R. K. (2015). Security threats of wireless networks: A survey, International Conference on Computing, Communication & Automation, pp. 389–395.
4. Determination of Wireless Networks Parameters through Parallel Hierarchical Support Vector Machines;Feng V;IEEE Transactions on Parallel and Distributed Systems,2012
5. Yubin Xu,Support Vector Machine Based Mobility Prediction Scheme in Heterogeneous Wireless Networks;Jiamei Chen L,2015