Search

Your search keyword '"Wade Trappe"' showing total 185 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Topic business.industry Remove constraint Topic: business.industry
185 results on '"Wade Trappe"'

Search Results

1. A multi-link communication connectivity game under hostile interference

2. A Multi-Jammer Game With Latency as the User’s Communication Utility

3. A Multiple Access Channel Game Using Latency Metric

4. A Switching Transmission Game with Latency as the User’s Communication Utility

5. Energy-Ball

6. Auto++

7. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

8. Journal of Cybersecurity and Privacy: A New Open Access Journal

9. SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits

10. Drug Combinations: Mathematical Modeling and Networking Methods

11. Combating Jamming in Wireless Networks: A Bayesian Game with Jammer’s Channel Uncertainty

12. An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm

13. Overlay tunneling as a policy tool for defending mobile ad hoc networks

14. Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing

15. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown

16. Impact of Anchor Placement and Anchor Selection on Localization Accuracy

17. Dynamic Graph Theoretical Analysis of Functional Connectivity in Parkinson's Disease: The Importance of Fiedler Value

18. ROSTER: Radio Context Attestation in Cognitive Radio Network

19. Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters

20. Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming

21. Topology adaptation for robust ad hoc cyberphysical networks under puncture-style attacks

22. The challenges facing physical layer security

23. Applications of Graph Connectivity to Network Security

24. An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference

25. Low-Energy Security: Limits and Opportunities in the Internet of Things

26. A Security Framework for the Internet of Things in the Future Internet Architecture

27. Spectrum attacks aimed at minimizing spectrum opportunities

28. Equilibrium strategies for an OFDM network that might be under a jamming attack

29. Introduction to the Issue on Signal and Information Processing for Privacy

30. Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks

31. MIMO-Empowered Secondary Networks for Efficient Spectrum Sharing

32. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

33. A practical wireless reciprocity-aware key establishment protocol

34. Bo-ear

35. Bargaining over secrecy and reliability for low SNR OFDM communications

36. Maintaining throughput network connectivity in ad hoc networks

37. On the Vulnerabilities of CSI in MIMO Wireless Communication Systems

38. Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel

39. Detecting anomalous spectrum usage in dynamic spectrum access networks

40. BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams

41. Integrating machine learning in ad hoc routing: A wireless adaptive routing protocol

42. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks

43. Achieving Secret Communication for Fast Rayleigh Fading Channels

44. Cybersecurity: A New Open Access Journal

45. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks

46. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications

47. An IBC and certificate based hybrid approach to WiMAX security

48. Channel-based spoofing detection in frequency-selective rayleigh channels

49. Channel-Based Detection of Sybil Attacks in Wireless Networks

50. Characterizing indoor wireless channels via ray tracing combined with stochastic modeling

Catalog

Books, media, physical & digital resources