Search

Your search keyword '"Jamming attacks"' showing total 99 results

Search Constraints

Start Over You searched for: Descriptor "Jamming attacks" Remove constraint Descriptor: "Jamming attacks"
99 results on '"Jamming attacks"'

Search Results

51. Performance Analysis of Chaotic DSSS-CDMA Synchronization Under Jamming Attack.

52. Energy Harvesting from Jamming Attacks in Multi-User Massive MIMO Networks

53. A Channel Selection Model based on Trust Metrics for Wireless Communications

54. Denial jamming attacks on wireless sensor network using sensitive agents.

55. Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems

56. Protecting Physical Layer Secret Key Generation from Active Attacks

57. Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems

58. Estimating the Relative Speed of RF Jammers in VANETs

59. Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks.

60. Exploring Impacts of Random Proactive Jamming Attack in Wireless Sensor Network

61. On secure connectivity with adjusting power to cope with jamming in sensor networks.

62. Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks.

63. Physical-layer intrusion detection for wireless networks using compressed sensing.

64. An Algorithm for Jammer Localization in Wireless Sensor Networks.

65. A zero-sum game theoretic framework for jamming detection and avoidance in Wireless Sensor Networks.

66. POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks.

67. Survivable Routing and Wavelength Assignment considering highpowered jamming attacks.

68. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.

69. Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

70. Energy and Distance evaluation for Jamming Attacks in wireless networks

71. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks

72. Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory

73. A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication

74. Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming

75. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks.

76. A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks.

77. BOĞMA SALDIRILARINA KARŞI DİNAMİK KANAL ATLAMALI YENİ BİR GÜVENLİK YÖNTEMİNİN TASARIMI VE BAŞARIM ANALİZİ.

78. Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

79. Optimization algorithms for the proactive configuration of elastic optical networks under jamming attacks and demand uncertainty.

80. Protecting Physical Layer Secret Key Generation from Active Attacks.

81. Field Demonstration of Machine-Learning-Aided Detection and Identification of Jamming Attacks in Optical Networks

82. Jamming Massive MIMO Using Massive MIMO : Asymptotic Separability Results

83. Energy Harvesting in Secret Key Generation Systems under Jamming Attacks

84. Jammer detection algorithm for wide-band radios using spectral correlation and neural networks

85. Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization.

86. Randomized Transmission Protocols for Protection against Jamming Attacks in Multi-Agent Consensus.

87. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks.

88. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey.

89. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses.

90. A mixed-integer programming approach for jammer placement problems for flow-jamming attacks on wireless communication networks

91. Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming

92. Cyclostationary-based jammer detection for wideband radios using compressed sensing and artificial neural network.

94. Usmjeravanje i dodjeljivanje valnih duljina za ograničavanje širenja napada ometanja u optičkim mrežama

95. Survivable routing and wavelength assignment considering high-powered jamming attacks

96. Design and Evaluation of a New Security Method with Dynamic Channel Hopping For Jamming Attacks

97. Compound attack-aware routing and wavelength assignment against power jamming

98. Gain Competition in Optical Amplifiers: A Case Study

99. Validation of a virtual test environment for C2X communication under radio jamming conditions

Catalog

Books, media, physical & digital resources