Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
Adversarial exploits of end-systems adaptation dynamics
Journal of Parallel and Distributed Computing
On intrusion detection in opportunistic networks
Proceedings of the 17th Panhellenic Conference on Informatics
Hi-index | 0.00 |
In an attempt to encourage engineers and security analysts to look at systems from the strangest perspectives, the author offers two examples why this is important: the first comes from the journalistic media the second comes from his group's research in protocol security for wireless ad hoc networking.