Author:
Rehman Saeed Ur,Sowerby Kevin W.,Coghill Colin
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Theoretical Computer Science
Reference42 articles.
1. Detecting identity-based attacks in wireless networks using signalprints;Faria,2006
2. Device fingerprinting to enhance wireless security using nonparametric bayesian method;Nguyen,2011
3. Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks];Mathur;IEEE Wireless Communications,2010
4. Improving intra-cellular security using air monitoring with rf fingerprints;Reising,2010
5. Identifying wireless users via transmitter imperfections;Polak;IEEE Journal on Selected Areas in Communications,2011
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献