If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (email@example.com).
Now showing items 1-1 of 1
Real-Time Inference of Topological Structure and Vulnerabilities for Adaptive Jamming Against Covert Ad Hoc Networks
With the emerging reliance of critical communications on ad hoc architectures, ensuring the security of such networks is paramount. Even though the independence of ad hoc networks from a single point of failure is seen as ...