Author:
Ramsey Benjamin W.,Stubbs Tyler D.,Mullins Barry E.,Temple Michael A.,Buckner Mark A.
Funder
U.S. Department of Defense, U.S. Department of Energy or United States Government
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modelling and Simulation
Reference24 articles.
1. Industrial wireless: all quiet on the wireless front;Boyes;Control Glob.,2011
2. Hacking Exposed Wireless: Wireless Security Secrets and Solutions;Cache,2010
3. B. Danev, S. Capkun, Transient-based identification of wireless sensor nodes, in: Proceedings of the International Conference on Information Processing in Sensor Networks, 2009, pp. 25–36.
4. B. Danev, H. Luechken, S. Capkun, K. El Defrawy, Attacks on physical-layer identification, in: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 89–98, 2010.
5. C. Dubendorfer, B. Ramsey, M. Temple, An RF-DNA verification process for ZigBee networks, in: Proceedings of the Military Communications Conference, 2012.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献