Search

Your search keyword '"telecommunication security"' showing total 2,202 results

Search Constraints

Start Over You searched for: Descriptor "telecommunication security" Remove constraint Descriptor: "telecommunication security"
2,202 results on '"telecommunication security"'

Search Results

151. RASSS: a hijack‐resistant confidential information management scheme for distributed systems.

152. Trusted FPGA‐based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles.

153. Improved electro‐optic chaotic system with nonlinear electrical coupling.

154. Information hiding with adaptive steganography based on novel fuzzy edge identification.

155. Designing adaptive JPEG steganography based on the statistical properties in spatial domain.

156. Hybrid model for security‐aware cluster head selection in wireless sensor networks.

157. A BLIND APPROACH OF QR CODE BASED COLOR IMAGE WATERMARKING USING DWT.

158. Finite-time and fixed-time synchronization of a class of inertial neural networks with multi-proportional delays and its application to secure communication.

159. Effect of atmospheric absorption on millimetre wave frequencies for 5G cellular networks.

160. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks.

161. Методичний підхід до оцінки рівня економічної безпеки підприємств зв'язку

162. India Ends Free Border Movement With Myanmar, Citing Security.

163. Exit interview: Kemba Walden talks advancing cyber — and becoming a role model — in government.

164. Indoor localization for an unknown radio emitter employing graph-based optimization and improved RSSD.

165. Joint random mapping and artificial noise insertion for securing GPSM access in correlated eavesdropper channels

166. Satellite Cyber Security - the Last 'Final Frontier'.

167. IIoT WORKS OVERTIME.

168. Comments on 'Precoding for secrecy rate maximisation in cognitive MIMO wiretap channels'.

169. Secrecy capacity and optimal time allocation for MISO wiretap channel with a multiple-antennas jammer.

170. Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol

171. Boosting security for TELECOMMUNICATION ASSETS.

172. Robust image hashing using exact Gaussian–Hermite moments.

173. Evaluating the risk of eavesdropping a visible light communication channel.

174. Protection of Privacy Regarding Cell Phone Location.

175. GVANET project: an efficient deployment of a self‐powered, reliable and secured VANET infrastructure.

176. Survey on power analysis attacks and its impact on intelligent sensor networks.

177. Physical-Layer Security in TDD Massive MIMO.

178. Privacy and data security for grid‐connected home area network using Internet of Things.

179. A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights.

180. UAV-Aided Secure Communications With Cooperative Jamming.

181. FINITE-TIME ADAPTIVE MODIFIED FUNCTION PROJECTIVE MULTI-LAG GENERALIZED COMPOUND SYNCHRONIZATION FOR MULTIPLE UNCERTAIN CHAOTIC SYSTEMS.

182. Robust protection scheme against cyber‐physical attacks in power systems.

183. Single channel secure communication scheme based on synchronization of fractional-order chaotic Chua’s systems.

184. Finite-time chaos synchronization and its application in wireless sensor networks.

185. Server notaries: a complementary approach to the web PKI trust model.

186. Sequential opening multi‐jammers localisation in multi‐hop wireless network.

187. Milestones Related to the Development of Organizational Aspects of Cybersecurity and Protection against Cyber-Threats in the Czech Republic.

188. QCF for deep packet inspection.

189. Learning automaton‐based self‐protection algorithm for wireless sensor networks.

190. A Game-Theoretic Precoding for Secure Communication in MIMO Interference Channels.

191. Expected security performance of random linear binary codes in syndrome coding.

192. How orbital angular momentum modes are boosting the performance of radio links.

193. Quantum key distribution using in-line highly birefringent interferometers.

194. Jamming game for secure orthogonal frequency division multiplexing access systems.

195. Energy‐efficient scheme using multiple antennas in secure distributed detection.

196. A New Chaotic Map for Secure Transmission.

197. DoS attack in centralised sensor network against state estimation.

198. Cellular automata malware propagation model for WSN based on multi‐player evolutionary game.

199. UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication.

200. Game Theory for Cyber Security and Privacy.

Catalog

Books, media, physical & digital resources