Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

Saeed Ur Rehman, Kevin W Sowerby, Colin Coghill

Research output: Contribution to journalArticlepeer-review

57 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers'. Together they form a unique fingerprint.

Computer Science