Detailed DoS attacks in wireless networks and countermeasures

Hdl Handle:
http://hdl.handle.net/10149/306954
Title:
Detailed DoS attacks in wireless networks and countermeasures
Authors:
Mohammed, L. A. (Lawan); Issac, B. (Biju)
Affiliation:
Teesside University. School of Computing.
Citation:
Mohammed, L. A., Issac, B. (2007) 'Detailed DoS attacks in wireless networks and countermeasures' International Journal of Ad Hoc and Ubiquitous Computing; 2 (3):157 -166
Publisher:
Inderscience
Journal:
International Journal of Ad Hoc and Ubiquitous Computing
Issue Date:
2007
URI:
http://hdl.handle.net/10149/306954
DOI:
10.1504/IJAHUC.2007.012417
Additional Links:
http://www.inderscience.com/link.php?id=12417
Type:
Article
Language:
en
ISSN:
1743-8225; 1743-8233
Rights:
Subject to 6 month embargo, author can archive post-print (ie final draft post-refereeing). For full details see http://www.sherpa.ac.uk/romeo [Accessed: 17/12/2013]

Full metadata record

DC FieldValue Language
dc.contributor.authorMohammed, L. A. (Lawan)en_GB
dc.contributor.authorIssac, B. (Biju)en_GB
dc.date.accessioned2013-12-17T10:46:22Z-
dc.date.available2013-12-17T10:46:22Z-
dc.date.issued2007-
dc.identifier.citationInternational Journal of Ad Hoc and Ubiquitous Computing; 2 (3):157 -166en_GB
dc.identifier.issn1743-8225-
dc.identifier.issn1743-8233-
dc.identifier.doi10.1504/IJAHUC.2007.012417-
dc.identifier.urihttp://hdl.handle.net/10149/306954-
dc.language.isoenen
dc.publisherInderscienceen_GB
dc.relation.urlhttp://www.inderscience.com/link.php?id=12417en_GB
dc.rightsSubject to 6 month embargo, author can archive post-print (ie final draft post-refereeing). For full details see http://www.sherpa.ac.uk/romeo [Accessed: 17/12/2013]en_GB
dc.titleDetailed DoS attacks in wireless networks and countermeasuresen
dc.typeArticleen
dc.contributor.departmentTeesside University. School of Computing.en_GB
dc.identifier.journalInternational Journal of Ad Hoc and Ubiquitous Computingen_GB
or.citation.harvardMohammed, L. A., Issac, B. (2007) 'Detailed DoS attacks in wireless networks and countermeasures' International Journal of Ad Hoc and Ubiquitous Computing; 2 (3):157 -166-
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.