Cited By
View all- Gupta DSaia JYoung M(2018)Proof of Work Without All the WorkProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154333(1-10)Online publication date: 4-Jan-2018
- Bogdanoski MLatkoski PRisteski A(2017)Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access PointMobile Networks and Applications10.1007/s11036-016-0753-122:5(834-843)Online publication date: 1-Oct-2017
- Francia GThornton DBrookshire TSmith RVrbsky S(2012)Wireless vulnerability of SCADA systemsProceedings of the 50th annual ACM Southeast Conference10.1145/2184512.2184590(331-332)Online publication date: 29-Mar-2012
- Show More Cited By