Search

Your search keyword '"Wade Trappe"' showing total 63 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Topic computer security Remove constraint Topic: computer security
63 results on '"Wade Trappe"'

Search Results

1. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities

2. Journal of Cybersecurity and Privacy: A New Open Access Journal

3. An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective

4. Overlay tunneling as a policy tool for defending mobile ad hoc networks

5. A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity

6. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown

7. The challenges facing physical layer security

8. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious

9. A Reinforcement Protection Game in the Internet of Things

10. Low-Energy Security: Limits and Opportunities in the Internet of Things

11. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies

12. A Security Framework for the Internet of Things in the Future Internet Architecture

13. Spectrum attacks aimed at minimizing spectrum opportunities

14. Equilibrium strategies for an OFDM network that might be under a jamming attack

15. Introduction to the Issue on Signal and Information Processing for Privacy

16. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks

17. Cybersecurity: A New Open Access Journal

18. Secure wireless networking

19. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems

20. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks

21. A Secrecy and Security Dilemma in OFDM Communications

22. Impact of incomplete knowledge on scanning strategy

23. Spectrum scanning when the intruder might have knowledge about the scanner's capabilities

24. Jamming sensor networks: attack and defense strategies

25. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation

26. Fair Allocation of Throughput Under Harsh Operational Conditions

28. A policy-driven approach to access control in future internet name resolution services

29. Feasibility of Launching User Spoofing

30. Detection and Localizing Multiple Spoofing Attackers

31. Secret Communication When the Eavesdropper Might Be an Active Adversary

32. Detecting Mobile Agents Using Identity Fraud

33. To Eavesdrop or Jam, That is the Question

34. Resilient Leadership Delegation in Tactical Systems

35. Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments

36. Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet

37. The eavesdropping and Jamming Dilemma in multi-channel communications

38. Law Governed Peer-to-Peer Secondary Spectrum Marketplaces

39. Securing Mobile Location-based Services through position verification leveraging key distribution

40. Opening Up the Last Frontiers for Securing the Future Wireless Internet

41. Reactive on-board regulation of cognitive radios

42. P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks

43. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

44. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks

45. Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels

46. Fingerprints in the Ether: Channel-Based Authentication

47. Detecting sybil attacks inwireless and sensor networks using cluster analysis

48. Anti-jamming timing channels for wireless networks

49. A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios

50. Light-weight Detection of Spoofing Attacks in Wireless Networks

Catalog

Books, media, physical & digital resources