On modeling eavesdropping attacks in wireless networks

  • Xuran Li
  • , Jianlong Xu
  • , Hong-Ning Dai*
  • , Qinglin Zhao
  • , Chak Fong Cheang
  • , Qiu Wang
  • *Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

29 Citations (Scopus)

Fingerprint

Dive into the research topics of 'On modeling eavesdropping attacks in wireless networks'. Together they form a unique fingerprint.
Sort by:

Keyphrases

Computer Science