@dblp

The Implementation of a Proactive Wireless Intrusion Detection System.

, , , and . CIT, page 581-586. IEEE Computer Society, (2004)

Links and resources

Tags