Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
From MaRDI portal
Publication:389385
DOI10.1016/J.JCSS.2013.06.013zbMath1311.68065OpenAlexW1980668046MaRDI QIDQ389385
Colin Coghill, Saeed Ur Rehman, Kevin W. Sowerby
Publication date: 20 January 2014
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/10652/2708
This page was built for publication: Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers