

Author: Watkins Lanier Beyah Raheem Corbett Cherita
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.4, Iss.3, 2009-07, pp. : 153-163
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Zarei Mani Rahmani Amir Masoud Farazkish Razieh
International Journal of Ad Hoc and Ubiquitous Computing, Vol. 8, Iss. 1-2, 2011-07 ,pp. :






Securing wireless mobile nodes from distributed denial‐of‐service attacks
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 1532-0626, Iss. 15, 2015-10 ,pp. :