[ACM Press the third ACM conference - Hoboken, New Jersey, USA (2010.03.22-2010.03.24)] Proceedings of the third ACM conference on Wireless network security - WiSec '10 - Timing-based localization of in-band wormhole tunnels in MANETs
โ Scribed by Kim, Jinsub; Sterne, Dan; Hardy, Rommie; Thomas, Roshan K.; Tong, Lang
- Book ID
- 115508169
- Publisher
- ACM Press
- Year
- 2010
- Weight
- 754 KB
- Volume
- 0
- Category
- Article
- ISBN
- 1605589233
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperfections exhibited by its radio transceiver. It can be used to improve access control in wireless networks, prevent device
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a social graph with edges labeled with probabilities of influence between users. However, the question of where these proba