Sciweavers

Share
ISCC   2006 IEEE Symposium on Computers and Communications
Wall of Fame | Most Viewed ISCC-2006 Paper
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
9 years 4 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and dif´Čücult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source256
2Download preprint from source202
3Download preprint from source190
4Download preprint from source188
5Download preprint from source188
6Download preprint from source182
7Download preprint from source169
8Download preprint from source166
9Download preprint from source162
10Download preprint from source154
11Download preprint from source147
12Download preprint from source134
13Download preprint from source133
14Download preprint from source129
15Download preprint from source129
16Download preprint from source128
17Download preprint from source127
18Download preprint from source127
19Download preprint from source127
20Download preprint from source126
21Download preprint from source123
22Download preprint from source123
23Download preprint from source118
24Download preprint from source115
25Download preprint from source114
26Download preprint from source113
27Download preprint from source112
28Download preprint from source109
29Download preprint from source109
30Download preprint from source109
31Download preprint from source104
32Download preprint from source103
33Download preprint from source102
34Download preprint from source99
35Download preprint from source99
36Download preprint from source98
37Download preprint from source96
38Download preprint from source92
39Download preprint from source90
40Download preprint from source90
41Download preprint from source89
42Download preprint from source88
43Download preprint from source86
44Download preprint from source84
45Download preprint from source72
46Download preprint from source69
books