Cited By
View all- Abu Laila DAl-Na'amneh QAljaidi MNasayreh AGharaibeh HAl Mamlook RAlshammari M(2024)Simulation of Routing Protocols for Jamming Attacks in Mobile Ad-Hoc NetworkRisk Assessment and Countermeasures for Cybersecurity10.4018/979-8-3693-2691-6.ch013(235-252)Online publication date: 31-May-2024
- Reyes DHsu JWagner CPohly D(2023)Dynamic Security Parameters for Multichannel Secret Sharing Protocols2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00227(1667-1672)Online publication date: 1-Nov-2023
- Cheng XShi JSha MGuo L(2023)Revealing Smart Selective Jamming Attacks in WirelessHART NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2022.322435831:4(1611-1625)Online publication date: Aug-2023
- Show More Cited By