Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

Title
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Authors
Keywords
-
Journal
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
Volume 80, Issue 3, Pages 591-601
Publisher
Elsevier BV
Online
2013-07-05
DOI
10.1016/j.jcss.2013.06.013

Ask authors/readers for more resources

Find Funding. Review Successful Grants.

Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.

Explore

Publish scientific posters with Peeref

Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.

Learn More