Search

Your search keyword '"Wade Trappe"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Publisher institute of electrical and electronics engineers (ieee) Remove constraint Publisher: institute of electrical and electronics engineers (ieee)
47 results on '"Wade Trappe"'

Search Results

3. A Multi-Jammer Power Control Game

4. A Multi-Jammer Game With Latency as the User’s Communication Utility

5. A Jamming Game With Rival-Type Uncertainty

6. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

8. An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm

9. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System

10. Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing

11. A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity

12. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown

13. The challenges facing physical layer security

14. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious

15. Low-Energy Security: Limits and Opportunities in the Internet of Things

16. Introduction to the Issue on Signal and Information Processing for Privacy

17. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

18. On the Vulnerabilities of CSI in MIMO Wireless Communication Systems

19. Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel

20. BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams

21. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks

22. Achieving Secret Communication for Fast Rayleigh Fading Channels

23. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks

24. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications

25. Secure wireless networking

26. An IBC and certificate based hybrid approach to WiMAX security

27. Channel-based spoofing detection in frequency-selective rayleigh channels

28. Channel-Based Detection of Sybil Attacks in Wireless Networks

29. Characterizing indoor wireless channels via ray tracing combined with stochastic modeling

30. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems

31. Managing the Mobility of a Mobile Sensor Network Using Network Dynamics

32. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships

33. Reducing Delay and Enhancing DoS Resistance in Multicast Authentication Through Multigrade Security

34. Fundamentals of Wireless Communications [Book Review

35. Jamming sensor networks: attack and defense strategies

36. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation

37. Resource-aware conference key establishment for heterogeneous networks

38. A scalable multicast key management scheme for heterogeneous wireless networks

39. Signal Processing for Smart Vehicle Technologies [From the Guest Editors]

40. Key management and distribution for secure multimedia multicast

41. Anti-collusion fingerprinting for multimedia

42. No Need for Speed : More Signal Processing Innovation Is Required Before Adopting Automated Vehicles [In the Spotlight]

43. Data Treasure Hunters: Science Expanding to New Frontiers [In the Spotlight]

44. Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

45. Bargaining over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications

46. Signal Processing for Cybersecurity and Privacy [From the Guest Editors]

47. Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems

Catalog

Books, media, physical & digital resources