Modeling and Verification Tools for greedy attacks in non-slotted 802.15.4 - Archive ouverte HAL Access content directly
Conference Papers Year :

Modeling and Verification Tools for greedy attacks in non-slotted 802.15.4

(1) , ,
1
Abdelkrim Abdelli
  • Function : Author
Jalel Ben-Othman
Not file

Dates and versions

hal-01724342 , version 1 (06-03-2018)

Identifiers

  • HAL Id : hal-01724342 , version 1

Cite

Lynda Mokdad, Abdelkrim Abdelli, Jalel Ben-Othman. Modeling and Verification Tools for greedy attacks in non-slotted 802.15.4. IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'14), Sep 2014, Paris, France. ⟨hal-01724342⟩

Collections

LACL UPEC
31 View
0 Download

Share

Gmail Facebook Twitter LinkedIn More