Chrome Extension
WeChat Mini Program
Use on ChatGLM

Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack with Clock Model-Based Detection and Mitigation Scheme

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT(2023)

Cited 2|Views17
Key words
Delay attack,security,synchronization
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined