dc.contributor.author |
Ning, Peng |
|
dc.contributor.author |
Sun, Kun |
|
dc.date.accessioned |
2007-01-04T19:55:33Z |
|
dc.date.available |
2007-01-04T19:55:33Z |
|
dc.date.issued |
2003 |
|
dc.identifier.uri |
ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2003/TR-2003-07.ps.Z |
|
dc.identifier.uri |
http://www.lib.ncsu.edu/resolver/1840.4/773 |
|
dc.format.extent |
352339 bytes |
|
dc.format.extent |
950010 bytes |
|
dc.format.mimetype |
application/pdf |
|
dc.format.mimetype |
application/pdf |
|
dc.format.mimetype |
application/postscript |
|
dc.language.iso |
en |
|
dc.publisher |
North Carolina State University. Dept. of Computer Science |
|
dc.relation.ispartofseries |
TR-2003-07 |
|
dc.relation.ispartofseries |
Department of Computer Science Technical Report |
|
dc.title |
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols |
|
dc.type |
Technical report |
|