1.

Tracking the position of cognitive radio without ____

A. authorization violates user privacy
B. authorization is an adversarial attack
C. authentication violates user privacy
D. authentication is an adversarial attack
Answer» B. authorization is an adversarial attack


Discussion

No Comment Found