542 results on '"Wade Trappe"'
Search Results
202. Channel-based detection of Sybil attacks in wireless networks.
203. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
204. A security and robustness performance analysis of localization algorithms to signal strength attacks.
205. Temporal privacy in wireless sensor networks: Theory and practice.
206. Secure wireless networking.
207. An IBC and certificate based hybrid approach to WiMAX security.
208. Channel-based spoofing detection in frequency-selective rayleigh channels.
209. Characterizing Indoor Wireless Channels via Ray Tracing Combined with Stochastic Modeling.
210. Distributed beamforming based wireless power transfer: Analysis and realization
211. A Multi-Jammer Game With Latency as the User’s Communication Utility
212. A Jamming Game With Rival-Type Uncertainty
213. Projecting the Pandemic Trajectory through Modeling the Transmission Dynamics of COVID-19
214. Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems.
215. Secure, pseudonymous, and auditable communication in vehicular ad hoc networks.
216. Defending wireless sensor networks from radio interference through channel adaptation.
217. Managing the Mobility of a Mobile Sensor Network Using Network Dynamics.
218. Using the physical layer for wireless authentication in time-variant channels.
219. Practical Interpolation for Spectrum Cartography through Local Path Loss Modeling.
220. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships.
221. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security.
222. Jamming sensor networks: attack and defense strategies.
223. Resource-aware conference key establishment for heterogeneous networks.
224. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.
225. Collusion-resistant fingerprinting for multimedia.
226. A scalable multicast key management scheme for heterogeneous wireless networks.
227. Group-Oriented Fingerprinting for Multimedia Forensics.
228. Key management and distribution for secure multimedia multicast.
229. Anti-collusion fingerprinting for multimedia.
230. Cybersecurity: A New Open Access Journal.
231. Optimum Design for Coexistence Between Matrix Completion Based MIMO Radars and a MIMO Communication System.
232. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics.
233. Improved AP association management using machine learning.
234. Exploiting environmental properties for wireless localization.
235. A Feature Article Cluster on Brain Signal Analytics: Analytical Approaches to Enhanced Understanding of Brain Function From the Editors.
236. Mobile network management and robust spatial retreats via network dynamics.
237. A Multiple Access Channel Game Using Latency Metric
238. Welcome message.
239. A Security Framework for the Internet of Things in the Future Internet Architecture.
240. Data Treasure Hunters: Science Expanding to New Frontiers [In the Spotlight].
241. No Need for Speed : More Signal Processing Innovation Is Required Before Adopting Automated Vehicles [In the Spotlight].
242. Demo abstract: Towards continuous tracking: Low-power communication and fail-safe presence assurance.
243. Dosage strategies for delaying resistance emergence in heterogeneous tumors
244. Information-theoretically Secret Key Generation for Fading Wireless Channels
245. Using the Physical Layer for Wireless Authentication in Time-Variant Channels
246. MIMO-Assisted Channel-Based Authentication in Wireless Networks
247. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
248. A Power Control Problem for a Dual Communication-Radar System Facing a Jamming Threat
249. A Switching Transmission Game with Latency as the User’s Communication Utility
250. Channel surfing: defending wireless sensor networks from jamming and interference.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.