Search

Your search keyword '"Eavesdropping"' showing total 8,652 results

Search Constraints

Start Over You searched for: Descriptor "Eavesdropping" Remove constraint Descriptor: "Eavesdropping"
8,652 results on '"Eavesdropping"'

Search Results

1. Pilot spoofing attack detection and channel estimation for secure massive MIMO.

2. A network coding transmission strategy for preventing eavesdropping attacks.

3. A proactive defense method against eavesdropping attack in SDN-based storage environment.

4. Not afraid of the big bad wolf: calls from large predators do not silence mesopredators.

5. Intelligent-Reflecting-Surface-Assisted Single-Input Single-Output Secure Transmission: A Joint Multiplicative Perturbation and Constructive Reflection Perspective.

6. Ultra-Reliable and Low-Latency Wireless Hierarchical Federated Learning: Performance Analysis †.

7. Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission.

8. Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies.

9. Privacy‐preserving‐based fuzzy filtering for nonlinear networked systems with adaptive‐event‐triggered mechanism and FDI attacks.

10. Alarm calls of sagebrush converge when herbivory is high.

11. Two New Bio-Inspired Particle Swarm Optimisation Algorithms for Single-Objective Continuous Variable Problems Based on Eavesdropping and Altruistic Animal Behaviours.

12. Survey on 5G Physical Layer Security Threats and Countermeasures.

13. Strangers like me: birds respond equally to a familiar and an unfamiliar sentinel species' alarm calls, but respond less to non‐core and non‐sentinel's alarm calls.

14. A secure user authentication scheme for crypto-wallet in IoT environment.

15. Challenges and Solutions for Secure Key Management and Monitoring: Review of the Cerberis3 Quantum Key Distribution System.

16. Physical Layer Security of 6G Vehicular Networks with UAV Systems: First Order Secrecy Metrics, Optimization, and Bounds.

17. Lasting benefits of embryonic eavesdropping on parent-parent communication.

18. Enhancing security for document exchange using authentication and GAN encryption.

19. A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments.

20. Comment and improvement on the "semi-quantum ring signature protocol based on multi-particle GHZ state".

21. Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator.

22. A novel approach to secure communication in mega events through Arabic text steganography utilizing invisible Unicode characters.

23. Domestic chicken hens can eavesdrop on the alarm calls of wild tits.

24. Quantum conference key agreement based on differential-phase-shift quantum key distribution.

25. A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing.

26. Physical‐layer security enhancement in wireless sensor networks through artificial noise optimization.

27. Securing Communication in Internet of Vehicles using Collaborative Cryptography and Intelligent Reflecting Surfaces.

28. HawkEar: A bird‐borne visual and acoustic platform for eavesdropping the behaviour of mobile animals.

29. The weakest link: The vulnerability of U.S. and allied global information networks in the nuclear age.

30. Security Performance Analysis of Full-Duplex UAV Assisted Relay System Based on SWIPT Technology.

31. Climate Change Threats to Stone Cultural Heritage: State of the Art of Quantitative Damage Functions and New Challenges for a Sustainable Future.

32. Secured Performance Analysis of Double Scattering MIMO Network.

33. Single‐species and multi‐species playbacks elicit asymmetrical responses within mixed‐species chickadee, titmouse, and nuthatch flocks.

34. A Hitchhiker's Ride: The Honey Bee Louse Braula Coeca (Diptera: Braulidae) Selects its Host by Eavesdropping.

35. OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY.

36. Islamic fashion in Malaysia: the commodification of religious values on Instagram.

37. Joint Eavesdropping on the BB84 Decoy State Protocol with an Arbitrary Passive Light-source Side Channel.

39. Security in Opportunistic Networks

40. BiFrost: A Blockchain-Based Decentralized Messaging Application

41. Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems

42. Cell signaling error control for reliable molecular communications.

43. Three sympatric host nestlings eavesdrop on cuckoo nestling distress calls.

44. Seminatural areas act as reservoirs of genetic diversity for crop pollinators and natural enemies across Europe.

45. An efficient controlled semi-quantum secret sharing protocol with entangled state.

46. Nadzorować i słuchać.

47. Privacy‐preserving scheme of distributed sensor networks with dynamic code.

48. Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems.

49. Media, audiences, and migrations: a Systematic Literature Review.

50. The importance of quantifying fitness-determining traits throughout life to assess the application of reproductive technologies for amphibian species recovery.

Catalog

Books, media, physical & digital resources