On modeling eavesdropping attacks in wireless networks
- Xuran Li
- , Jianlong Xu
- , Hong-Ning Dai*
- , Qinglin Zhao
- , Chak Fong Cheang
- , Qiu Wang
*Corresponding author for this work
Research output: Contribution to journal › Journal article › peer-review
29
Citations
(Scopus)