2 Questions 5 Answers 0 Followers
Questions related from Vahid Veysi Sabegh
Routing protocols for bluetooth-based networks are very wide. Some of them are reactive and some proactive. There are also hybrid protocols that merge reactive & proactive approaches to use...
01 January 2013 7,214 2 View
My research domain is on the cognitive radio security. One of the most important security problems in CR networks is PUE(primary user emulation) attack where the malicious node emulates primary...
12 December 2012 3,616 6 View