"Analysis of impersonation attacks on systems using RF fingerprinting and ..."

Saeed Ur Rehman, Kevin W. Sowerby, Colin Coghill (2014)

Details and statistics

DOI: 10.1016/J.JCSS.2013.06.013

access: open

type: Journal Article

metadata version: 2021-02-16

a service of  Schloss Dagstuhl - Leibniz Center for Informatics