00827 a2200217 4500003000500000005001700005020001800022040000900040082001400049100001800063110001100081245007800092260004500170300001600215505018300231650004600414651001100460942001200471999001900483952010700502Nust20170207165829.0 a9780387884912 cNust a621.38225 aYingying Chen2 aZhang.10aSecuring Emerging Wireless Systems (E-BOOK) bLower-layer Approaches /c. aBoston, MA :bSpringer-Verlag US,c2009. bv.: digital aIntroduction (Page-1) Part-I Secure Localization (Page-9) Part- II Defending Against Wireless Spoofing Attacks (Page-121) Part-III Defending Against Radio Interference (Page-173) 0aTelecommunications engineering - (E-BOOK) aE-Book 2ddccBK c213179d213179 00102ddc40708NFICaMCSbMCSd2016-12-12l0o621.38225 CHEpMCSEB-3222r2016-12-08w2016-12-12yBK