Reactive Jamming in Wireless Networks: How Realistic is the Threat?

Bibliographic Details
Main Authors: Wilhelm, M, Martinovic, I, Schmitt, J, Lenders, V
Format: Conference item
Published: ACM 2011
_version_ 1826267293547495424
author Wilhelm, M
Martinovic, I
Schmitt, J
Lenders, V
author_facet Wilhelm, M
Martinovic, I
Schmitt, J
Lenders, V
author_sort Wilhelm, M
collection OXFORD
description
first_indexed 2024-03-06T20:51:57Z
format Conference item
id oxford-uuid:37e53658-488d-490e-8c3f-bdcc8eddd136
institution University of Oxford
last_indexed 2024-03-06T20:51:57Z
publishDate 2011
publisher ACM
record_format dspace
spelling oxford-uuid:37e53658-488d-490e-8c3f-bdcc8eddd1362022-03-26T13:46:42ZReactive Jamming in Wireless Networks: How Realistic is the Threat?Conference itemhttp://purl.org/coar/resource_type/c_5794uuid:37e53658-488d-490e-8c3f-bdcc8eddd136Department of Computer ScienceACM2011Wilhelm, MMartinovic, ISchmitt, JLenders, V
spellingShingle Wilhelm, M
Martinovic, I
Schmitt, J
Lenders, V
Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title_full Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title_fullStr Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title_full_unstemmed Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title_short Reactive Jamming in Wireless Networks: How Realistic is the Threat?
title_sort reactive jamming in wireless networks how realistic is the threat
work_keys_str_mv AT wilhelmm reactivejamminginwirelessnetworkshowrealisticisthethreat
AT martinovici reactivejamminginwirelessnetworkshowrealisticisthethreat
AT schmittj reactivejamminginwirelessnetworkshowrealisticisthethreat
AT lendersv reactivejamminginwirelessnetworkshowrealisticisthethreat