Search

Your search keyword '"Communication system security"' showing total 1,473 results

Search Constraints

Start Over You searched for: Descriptor "Communication system security" Remove constraint Descriptor: "Communication system security"
1,473 results on '"Communication system security"'

Search Results

1. Keeping Verticals' Sovereignty During Application Migration in Continuum.

2. Challenges and Opportunities for Beyond-5G Wireless Security

3. Control Layer Security: A New Security Paradigm for Cooperative Autonomous Systems.

4. Secret Key Generation by Continuous Encryption Before Quantization

5. Pilot spoofing detection based on pilot random block encryption.

6. Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RIS.

7. Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls

8. Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics

9. Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes

10. Encryption Device Based on Wave-Chaos for Enhanced Physical Security of Wireless Wave Transmission

11. Secure key distribution exploiting error rate criticality for radio frequency links

12. STAR-RIS Assisted Secure Transmission for Downlink Multi-Carrier NOMA Networks.

13. Design of Low Probability Detection Signal with Application to Physical Layer Security.

14. A novel feature-based framework enabling multi-type DDoS attacks detection.

15. Service Function Chaining in Industrial Internet of Things With Edge Intelligence: A Natural Actor-Critic Approach.

16. Synthetic Generation of Realistic Signal Strength Data to Enable 5G Rogue Base Station Investigation in Vehicular Platooning.

17. Securing IoT Devices by Exploiting Backscatter Propagation Signatures.

18. Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey

19. Secrecy Throughput Maximization for IRS-Aided MIMO Wireless Powered Communication Networks.

20. Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength.

21. Confidentiality-Preserving Edge-Based Wireless Communications for Contact Tracing Systems.

22. RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks.

23. Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks.

24. Security Context Migration in MEC: Challenges and Use Cases.

25. Encryption AXI Transaction Core for Enhanced FPGA Security.

26. Bayes-Based Distributed Estimation in Adversarial Multitask Networks.

27. Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models.

28. A Secure and Intelligent Framework for Vehicle Health Monitoring Exploiting Big-Data Analytics.

29. Intelligent Reflecting Surface Aided Secure Transmission With Colluding Eavesdroppers.

30. Covert Communication With Energy Replenishment Constraints in UAV Networks.

31. On the Performance of Partial RIS Selection vs. Partial Relay Selection for Vehicular Communications.

32. Robust IRS-Aided Secrecy Transmission With Location Optimization.

33. Eavesdropping Detection in BB84 Quantum Key Distribution Protocols.

34. Scalable Service-Driven Database-Enabled Wireless Network Virtualization for Robust RF Sharing.

35. Pervasive Machine Learning for Smart Radio Environments Enabled by Reconfigurable Intelligent Surfaces.

36. Reconfigurable Intelligent Surfaces: Channel Characterization and Modeling.

37. Decentralized Wireless Federated Learning With Differential Privacy.

38. Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0.

39. RIS-Empowered Non-Linear Energy Harvesting Communications Over Nakagami- m Channels.

40. Quadratically Constrained Myopic Adversarial Channels.

41. Defending Trace-Back Attack in 3D Wireless Internet of Things.

42. Transfer Learning for Wireless Networks: A Comprehensive Survey.

43. Non-Orthogonal Multiple Access Assisted Secure Computation Offloading via Cooperative Jamming.

44. UAV Relay Assisted Cooperative Jamming for Covert Communications Over Rician Fading.

45. UAV Relayed Covert Wireless Networks: Expand Hiding Range via Drones.

46. Reinforcement Learning-Based Intelligent Reflecting Surface Assisted Communications Against Smart Attackers.

47. An Authentication Protocol for the Medical Internet of Things.

48. Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis.

49. Towards Spoofing Resistant Next Generation IoT Networks.

50. Achieving Covert Wireless Communication With a Multi-Antenna Relay.

Catalog

Books, media, physical & digital resources