Fingerprint
Dive into the research topics of 'Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Saeed Ur Rehman, Kevin W Sowerby, Colin Coghill
Research output: Contribution to journal › Article › peer-review