Search

Your search keyword '"telecommunication security"' showing total 2,202 results

Search Constraints

Start Over You searched for: Descriptor "telecommunication security" Remove constraint Descriptor: "telecommunication security"
2,202 results on '"telecommunication security"'

Search Results

201. Spectrum Sharing Policy: Interoperable Communication and Information Sharing for Public Safety.

202. On physical‐layer security for primary system in underlay cognitive radio networks.

203. A two-stage flow-based intrusion detection model for next-generation networks.

204. HoneyBot: A Honeypot for Robotic Systems.

205. Security in device‐to‐device communications: a survey.

206. Electronic Protection is Just the Start.

207. Ensuring quantum-secured communications.

208. Network confidential.

209. Cryptography for the Internet.

210. Politics for the really cool.

211. A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks.

212. ViewQwest Chooses Lee Mun Fai as Field Boss Innovation Official to Help Developing Oversaw Security Administrations.

213. GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment

214. State space model-based trust evaluation over wireless sensor networks: an iterative particle filter approach

215. Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

216. An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities

218. SALVE: Server Authentication with Location VErification.

219. Secure and Energy-Efficient Resource Allocation for Wireless Power Enabled Full-/Half-Duplex Multiple-Antenna Relay Systems.

220. Security assessment of the Spanish contactless identity card.

221. Memory attestation of wireless sensor nodes through trusted remote agents.

222. Identification as a deterrent for security enhancement in cognitive radio networks.

223. Towards an incentive‐compatible, reputation‐based framework for stimulating cooperation in opportunistic networks: a survey.

224. Restricted Boltzmann machine‐based cognitive protocol for secure routing in software defined wireless networks.

225. Multi‐location virtual smart grid laboratory with testbed for analysis of secure communication and remote co‐simulation: concept and application to integration of Berlin, Stockholm, Helsinki.

226. NFV: Security Threats and Best Practices.

227. Evolving attackers against wireless sensor networks using genetic programming.

228. SECURITY ASPECTS OF VEHICULAR AD-HOC NETWORK (VANETS): A REVIEW.

229. Time‐modulated FDA for physical‐layer security.

230. DNA and Bernoulli Random Number Generator Based Security Key Generation Algorithm.

231. Physical layer spoofing detection based on sparse signal processing and fuzzy recognition.

232. UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.

233. Toward a Trust Evaluation Mechanism in the Social Internet of Things.

234. The Influence of Customer Movement between Sales Areas on Sales Amount: A Dynamic Bayesian Model of the In-store Customer Movement and Sales Relationship.

235. Penetration Testing in Wireless Networks.

236. Secret key generation scheme from WiFi and LTE reference signals.

237. Combining artificial noise beam forming and concatenated coding schemes to effectively secure wireless communications.

238. A Short Range Wireless Network: Bluetooth.

239. Design of an OFDM Physical Layer Encryption Scheme.

240. Mass surveillance and technological policy options: Improving security of private communications.

241. Formal verification of LTE-UMTS and LTE–LTE handover procedures.

242. Adaptive resource allocation scheme for cognitive radio vehicular ad‐hoc network in the presence of primary user emulation attack.

243. Reversible logic‐based image steganography using quantum dot cellular automata for secure nanocommunication.

244. A New Platform of WBAN in Real Time Tele Medicine and Healthcare Ecosystems to Manage the Covid-19.

245. CSO secret communication.

246. Two‐dimensional encryption system for secure free‐space optical communication of time‐series data streams.

247. Secrecy outage analysis of double shadowed Rician channels.

248. Low‐cost robust anti‐removal logic for protecting functionally obfuscated DSP core against removal attack.

249. Secure communication in multigroup multicasting cell‐free massive MIMO networks with active spoofing attack.

250. Apple: Five years, that's what you've got.

Catalog

Books, media, physical & digital resources