![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Kulkarni Amit Bush Stephen
Publisher: Springer Publishing Company
ISSN: 1064-7570
Source: Journal of Network and Systems Management, Vol.14, Iss.1, 2006-03, pp. : 69-80
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Securing wireless mobile nodes from distributed denial‐of‐service attacks
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 1532-0626, Iss. 15, 2015-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)