|
|
|
|
LEADER |
01009naa a2200289 i 4500 |
001 |
NSK01000996356 |
003 |
HR-ZaNSK |
005 |
20180508142226.0 |
007 |
ta |
008 |
180508s2015 ci | |0|| ||eng |
035 |
|
|
|a (HR-ZaNSK)000996356
|
040 |
|
|
|a HR-ZaNSK
|b hrv
|c HR-ZaNSK
|e ppiak
|
042 |
|
|
|a croatica
|
044 |
|
|
|a ci
|c hr
|
080 |
1 |
|
|a 004
|2 2011
|
100 |
1 |
|
|a Dong, Ziqian
|4 aut
|
245 |
1 |
0 |
|a Detecting and locating man-in-the-middle attacks in fixed wireless networks /
|c Ziqian Dong, Randolph Espejo, Yu Wan, Wenjie Zhuang.
|
300 |
|
|
|b Ilustr.
|
504 |
|
|
|a Bibliografija: 23 jed.
|
653 |
|
0 |
|a Bežične mreže
|a MITM napad
|a Detekcija
|a Krađa identiteta
|
700 |
1 |
|
|a Espejo, Randolph
|4 aut
|
700 |
1 |
|
|a Wan, Yu
|4 aut
|
700 |
1 |
|
|a Zhuang, Wenjie
|4 aut
|
773 |
0 |
|
|t CIT. Journal of computing and information technology
|x 1330-1136
|g 23 (2015), 4 ; str. 283-293
|w nsk.(HR-ZaNSK)000018028
|
981 |
|
|
|b B11/15
|
998 |
|
|
|b migo1805
|
856 |
4 |
1 |
|u https://hrcak.srce.hr/149732
|y Elektronička verzija članka
|