Abstract: In this article, a novel important-data-based (IDB) attack strategy and stochastic IDB attack power allocation scheme are proposed, from the attacker's perspective, to degrade the remote ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results