Related Work (English)
- New search for: Yang, Jie
- New search for: Chen, Yingying
- New search for: Trappe, Wade
- New search for: Cheng, Jerry
- New search for: Yang, Jie
- New search for: Chen, Yingying
- New search for: Trappe, Wade
- New search for: Cheng, Jerry
In:
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
;
Chapter: 6
;
67-69
;
2014
- Article/Chapter (Book) / Electronic Resource
-
Title:Related Work
-
Additional title:SpringerBriefs Computer Sci.
-
Contributors:Yang, Jie ( author ) / Chen, Yingying ( author ) / Trappe, Wade ( author ) / Cheng, Jerry ( author )
-
Published in:Pervasive Wireless Environments: Detecting and Localizing User Spoofing ; Chapter: 6 ; 67-69
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014-06-10
-
Size:3 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
IntroductionYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 2
-
Feasibility of Launching User SpoofingYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 3
-
Attack Detection ModelYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 4
-
Detection and Localizing Multiple Spoofing AttackersYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 5
-
Detecting Mobile Agents Using Identity FraudYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 6
-
Related WorkYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014
- 7
-
Conclusions and Future WorkYang, Jie / Chen, Yingying / Trappe, Wade / Cheng, Jerry et al. | 2014