How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols

Show simple item record

dc.contributor.author Ning, Peng
dc.contributor.author Sun, Kun
dc.date.accessioned 2007-01-04T19:55:33Z
dc.date.available 2007-01-04T19:55:33Z
dc.date.issued 2003
dc.identifier.uri ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2003/TR-2003-07.ps.Z
dc.identifier.uri http://www.lib.ncsu.edu/resolver/1840.4/773
dc.format.extent 352339 bytes
dc.format.extent 950010 bytes
dc.format.mimetype application/pdf
dc.format.mimetype application/pdf
dc.format.mimetype application/postscript
dc.language.iso en
dc.publisher North Carolina State University. Dept. of Computer Science
dc.relation.ispartofseries TR-2003-07
dc.relation.ispartofseries Department of Computer Science Technical Report
dc.title How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
dc.type Technical report


Files in this item

Files Size Format View
TR-2003-07.pdf 344.0Kb PDF View/Open
TR-2003-07.ps 927.7Kb Postscript View/Open

This item appears in the following Collection(s)

Show simple item record