Reactive Jamming in Wireless Networks: How Realistic is the Threat?
Main Authors: | , , , |
---|---|
Format: | Conference item |
Published: |
ACM
2011
|
_version_ | 1826267293547495424 |
---|---|
author | Wilhelm, M Martinovic, I Schmitt, J Lenders, V |
author_facet | Wilhelm, M Martinovic, I Schmitt, J Lenders, V |
author_sort | Wilhelm, M |
collection | OXFORD |
description | |
first_indexed | 2024-03-06T20:51:57Z |
format | Conference item |
id | oxford-uuid:37e53658-488d-490e-8c3f-bdcc8eddd136 |
institution | University of Oxford |
last_indexed | 2024-03-06T20:51:57Z |
publishDate | 2011 |
publisher | ACM |
record_format | dspace |
spelling | oxford-uuid:37e53658-488d-490e-8c3f-bdcc8eddd1362022-03-26T13:46:42ZReactive Jamming in Wireless Networks: How Realistic is the Threat?Conference itemhttp://purl.org/coar/resource_type/c_5794uuid:37e53658-488d-490e-8c3f-bdcc8eddd136Department of Computer ScienceACM2011Wilhelm, MMartinovic, ISchmitt, JLenders, V |
spellingShingle | Wilhelm, M Martinovic, I Schmitt, J Lenders, V Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title | Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title_full | Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title_fullStr | Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title_full_unstemmed | Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title_short | Reactive Jamming in Wireless Networks: How Realistic is the Threat? |
title_sort | reactive jamming in wireless networks how realistic is the threat |
work_keys_str_mv | AT wilhelmm reactivejamminginwirelessnetworkshowrealisticisthethreat AT martinovici reactivejamminginwirelessnetworkshowrealisticisthethreat AT schmittj reactivejamminginwirelessnetworkshowrealisticisthethreat AT lendersv reactivejamminginwirelessnetworkshowrealisticisthethreat |