Past week
All results
- All results
- Verbatim
4 days ago · Communication-based attacks exploit vulnerabilities in the physical communication channel, allowing attackers to disrupt or manipulate the virtual network ...
4 days ago · WirelessMAN: Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks|Nico J.M. Van Waes. ... Model-Based Detection and Isolation of Faults of ...
Missing: DDoS | Show results with:DDoS
3 days ago · Efficient Design of WiMAX/802.16 Mesh Networks: WiMAX 802.16 Mesh Network Optimization|Jad El-Najjar? The Crooked Albatross and Sweet Fanny Adams|Leigh ...
4 days ago · Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology|Sassan Ahmadi. Mantua: Practical Guide (Bonechi Travel Guides)| ...
4 days ago · An Introduction to Biological and Artificial Neural Networks for Pattern Recognition (SPIE Tutorial Text Vol. TT04) (Tutorial Texts in Optical Engineering)| ...
3 days ago · ... IEEE 6th Conference on Human Factors and Power ... based coating powders|IEC TC/SC 15. Evil in the ... Networks (Independent Learning Module from the ...
10 hours ago · Performance of Wireless Mesh Networks: Experimental Studies of IEEE 802.11 and IEEE 802.16 solutions|Nicola Scalabrino! Rasheed's Family Goes for a Ride ...
2 days ago · ... IEEE 802.16 WiMAX Next Generation Wireless Networks|Chakchai So-In. William Wordsworth, his doctrine and art in their historical relations|Arthur Beatty ...
3 days ago · ... Based on the Cloud Model (Economic Issues ... Detection of the 19th Century's Most Famous Crime ... Networks Environments|Hassan Keshavarz. Booby ...
2 days ago · Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations (Communications Engineering (Paperback))|Ron Olexa.