Search

Your search keyword '"Wade Trappe"' showing total 86 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Topic computer Remove constraint Topic: computer
86 results on '"Wade Trappe"'

Search Results

1. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

2. Journal of Cybersecurity and Privacy: A New Open Access Journal

3. Drug Combinations: Mathematical Modeling and Networking Methods

4. An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective

5. Overlay tunneling as a policy tool for defending mobile ad hoc networks

6. A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity

7. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown

8. The challenges facing physical layer security

9. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious

10. A Reinforcement Protection Game in the Internet of Things

11. Low-Energy Security: Limits and Opportunities in the Internet of Things

12. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies

13. A Security Framework for the Internet of Things in the Future Internet Architecture

14. Spectrum attacks aimed at minimizing spectrum opportunities

15. Equilibrium strategies for an OFDM network that might be under a jamming attack

16. Introduction to the Issue on Signal and Information Processing for Privacy

17. Detecting anomalous spectrum usage in dynamic spectrum access networks

18. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks

19. Cybersecurity: A New Open Access Journal

20. Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications

21. Secure wireless networking

22. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems

23. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks

24. A Secrecy and Security Dilemma in OFDM Communications

25. Impact of incomplete knowledge on scanning strategy

26. Jammer forensics: Localization in peer to peer networks based on Q-learning

27. Spectrum scanning when the intruder might have knowledge about the scanner's capabilities

28. Jamming sensor networks: attack and defense strategies

29. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation

30. Key management and distribution for secure multimedia multicast

31. Anti-collusion fingerprinting for multimedia

32. Fair Allocation of Throughput Under Harsh Operational Conditions

34. A policy-driven approach to access control in future internet name resolution services

35. Improved AP association management using machine learning

36. Feasibility of Launching User Spoofing

37. Attack Detection Model

38. Detection and Localizing Multiple Spoofing Attackers

39. Secret Communication When the Eavesdropper Might Be an Active Adversary

40. Detecting Mobile Agents Using Identity Fraud

41. To Eavesdrop or Jam, That is the Question

42. Resilient Leadership Delegation in Tactical Systems

43. Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments

44. Welcome message

45. Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet

46. The eavesdropping and Jamming Dilemma in multi-channel communications

47. Law Governed Peer-to-Peer Secondary Spectrum Marketplaces

48. Association attacks: Identifying association protocols

49. Securing Mobile Location-based Services through position verification leveraging key distribution

50. Opening Up the Last Frontiers for Securing the Future Wireless Internet

Catalog

Books, media, physical & digital resources