Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. Anand, S., Sengupta, S., Hong, K., Subbalakshmi, K. P., Chandramouli, R., & Cam, H. IEEE Transactions on Vehicular Technology, 63(8):3867\textendash3874, 2014.
Paper doi bibtex @article {DBLP:journals/tvt/AnandSHSCC14,
title = {Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities},
journal = {{IEEE} Transactions on Vehicular Technology},
volume = {63},
number = {8},
year = {2014},
pages = {3867{\textendash}3874},
doi = {10.1109/TVT.2014.2309115},
url = {http://dx.doi.org/10.1109/TVT.2014.2309115},
author = {Santhanakrishnan Anand and Shamik Sengupta and Kai Hong and K. P. Subbalakshmi and R. Chandramouli and Hasan Cam}
}
Downloads: 0
{"_id":"wPswhnN5eJN3d2TcL","bibbaseid":"anand-sengupta-hong-subbalakshmi-chandramouli-cam-exploitingchannelfragmentationandaggregationbondingtocreatesecurityvulnerabilities-2014","downloads":0,"creationDate":"2016-05-24T17:00:14.841Z","title":"Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities","author_short":["Anand, S.","Sengupta, S.","Hong, K.","Subbalakshmi, K. P.","Chandramouli, R.","Cam, H."],"year":2014,"bibtype":"article","biburl":"http://www.cse.unr.edu/~mgunes/Biblio-Bibtex.bib","bibdata":{"bibtype":"article","type":"article","title":"Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities","journal":"IEEE Transactions on Vehicular Technology","volume":"63","number":"8","year":"2014","pages":"3867\\textendash3874","doi":"10.1109/TVT.2014.2309115","url":"http://dx.doi.org/10.1109/TVT.2014.2309115","author":[{"firstnames":["Santhanakrishnan"],"propositions":[],"lastnames":["Anand"],"suffixes":[]},{"firstnames":["Shamik"],"propositions":[],"lastnames":["Sengupta"],"suffixes":[]},{"firstnames":["Kai"],"propositions":[],"lastnames":["Hong"],"suffixes":[]},{"firstnames":["K.","P."],"propositions":[],"lastnames":["Subbalakshmi"],"suffixes":[]},{"firstnames":["R."],"propositions":[],"lastnames":["Chandramouli"],"suffixes":[]},{"firstnames":["Hasan"],"propositions":[],"lastnames":["Cam"],"suffixes":[]}],"bibtex":"@article {DBLP:journals/tvt/AnandSHSCC14,\n\ttitle = {Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities},\n\tjournal = {{IEEE} Transactions on Vehicular Technology},\n\tvolume = {63},\n\tnumber = {8},\n\tyear = {2014},\n\tpages = {3867{\\textendash}3874},\n\tdoi = {10.1109/TVT.2014.2309115},\n\turl = {http://dx.doi.org/10.1109/TVT.2014.2309115},\n\tauthor = {Santhanakrishnan Anand and Shamik Sengupta and Kai Hong and K. P. Subbalakshmi and R. Chandramouli and Hasan Cam}\n}\n","author_short":["Anand, S.","Sengupta, S.","Hong, K.","Subbalakshmi, K. P.","Chandramouli, R.","Cam, H."],"key":"DBLP:journals/tvt/AnandSHSCC14","id":"DBLP:journals/tvt/AnandSHSCC14","bibbaseid":"anand-sengupta-hong-subbalakshmi-chandramouli-cam-exploitingchannelfragmentationandaggregationbondingtocreatesecurityvulnerabilities-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/TVT.2014.2309115"},"downloads":0,"html":""},"search_terms":["exploiting","channel","fragmentation","aggregation","bonding","create","security","vulnerabilities","anand","sengupta","hong","subbalakshmi","chandramouli","cam"],"keywords":[],"authorIDs":[],"dataSources":["TSaeFi5mEEMeweeET"]}