Search

Your search keyword '"Wade Trappe"' showing total 94 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
94 results on '"Wade Trappe"'

Search Results

1. A multiple access channel game with users implementing throughput and latency metrics

2. A jamming power control game with unknown user’s communication metric

3. An eavesdropping and jamming dilemma with sophisticated players

4. Dosage strategies for delaying resistance emergence in heterogeneous tumors

5. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics

6. Drug Combinations: Mathematical Modeling and Networking Methods

7. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies

8. A multi-link communication connectivity game under hostile interference

9. Distributed beamforming based wireless power transfer: Analysis and realization

10. Projecting the Pandemic Trajectory through Modeling the Transmission Dynamics of COVID-19

11. Dosage strategies for delaying resistance emergence in heterogeneous tumors

12. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

13. Journal of Cybersecurity and Privacy: A New Open Access Journal

14. An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm

15. Overlay tunneling as a policy tool for defending mobile ad hoc networks

16. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System

17. Topology adaptation for robust ad hoc cyberphysical networks under puncture-style attacks

18. The challenges facing physical layer security

19. An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference

20. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies

21. A Security Framework for the Internet of Things in the Future Internet Architecture

22. Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks

23. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

24. Detecting anomalous spectrum usage in dynamic spectrum access networks

25. Cybersecurity: A New Open Access Journal

26. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks

27. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications

28. An IBC and certificate based hybrid approach to WiMAX security

29. Channel-based spoofing detection in frequency-selective rayleigh channels

30. Channel-Based Detection of Sybil Attacks in Wireless Networks

31. Characterizing indoor wireless channels via ray tracing combined with stochastic modeling

32. A security and robustness performance analysis of localization algorithms to signal strength attacks

33. SEAR: a secure efficientad hocon demand routing protocol for wireless networks

34. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks

35. Managing the Mobility of a Mobile Sensor Network Using Network Dynamics

36. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships

37. Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks

38. Reducing Delay and Enhancing DoS Resistance in Multicast Authentication Through Multigrade Security

39. Jamming sensor networks: attack and defense strategies

40. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation

41. Resource-aware conference key establishment for heterogeneous networks

42. A scalable multicast key management scheme for heterogeneous wireless networks

43. Key management and distribution for secure multimedia multicast

44. Anti-collusion fingerprinting for multimedia

45. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics

46. Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments

47. Physical layer secret key generation for fiber-optical networks

48. Welcome message

49. A study of the influence of an off‐shore rise on low‐frequency modal propagation with Arctic surface loss

50. Law Governed Peer-to-Peer Secondary Spectrum Marketplaces

Catalog

Books, media, physical & digital resources