Search

Your search keyword '"Jamming attacks"' showing total 133 results

Search Constraints

Start Over You searched for: Descriptor "Jamming attacks" Remove constraint Descriptor: "Jamming attacks"
133 results on '"Jamming attacks"'

Search Results

1. Data‐driven adaptive resilient funnel consensus tracking of multiagent systems under jamming attacks.

3. A Blockchain-Based Attack Detection Mechanism in Healthcare Cyber Physical Systems Against Jamming Attacks

4. BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems

5. Novel Dynamic Defense Strategies in Networked Control Systems under Stochastic Jamming Attacks

6. Jamming Attack Classification in Wireless Networks Using Machine Learning

7. Adaptive Neuro-Fuzzy Technique for Jamming Detection in VANETs

8. Adaptive event-triggered control for almost sure stability for vehicle platooning under interference and stochastic attacks.

9. Scaling Exponential Backoff.

10. Network intelligence vs. jamming in underwater networks: how learning can cope with misbehavior

11. Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks.

12. Jamming-Resilient Synchronization of Networked Lagrangian Systems With Quantized Sampling Data.

13. POINT COORDINATION MECHANISM BASED MOBILE AD HOC NETWORK INVESTIGATION AGAINST JAMMERS.

14. Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks.

15. A Deep Autoencoder Trust Model for Mitigating Jamming Attack in IoT Assisted by Cognitive Radio.

16. Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks

17. Jamming Resilience of LTE Networks: A Measurement Study

19. High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

20. Resilient Dynamic Channel Access via Robust Deep Reinforcement Learning

21. A Comprehensive Review on Intrusion Detection and Prevention Schemes for Network Coding Enabled Mobile Small Cells.

22. Co-Design of Distributed Event-Triggered Controller for String Stability of Vehicle Platooning Under Periodic Jamming Attacks.

23. Data-Driven-Based Event-Triggered Control for Nonlinear CPSs Against Jamming Attacks.

25. Physical-Layer Authentication in Wirelessly Powered Communication Networks.

26. Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks.

27. A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks

28. Trust-Based Authentication for Smart Home Systems.

29. Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming

30. Resilient model-free adaptive control for cyber-physical systems against jamming attack.

31. Reinforcement-Learning-Based Relay Mobility and Power Allocation for Underwater Sensor Networks Against Jamming.

32. Event-triggered attack-tolerant tracking control design for networked nonlinear control systems under DoS jamming attacks.

33. Point coordination mechanism based mobile ad hoc network investigation against jammers

36. Protecting Physical Layer Secret Key Generation from Active Attacks

37. Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks

38. Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

39. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks

41. An Adaptable Module for Designing Jamming Attacks in WiFi Networks for ns-3

42. Secure Multi-hop Data Transmission in Cognitive Radio Networks Under Attack in the Physical Layer.

43. A resource-competitive jamming defense.

44. A New Approach for Error Rate Analysis of Wide-Band DSSS-CDMA System with Imperfect Synchronization Under Jamming Attacks.

45. Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks

46. Energy Harvesting from Jamming Attacks in Multi-User Massive MIMO Networks

47. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

48. Provisioning meets security in next generation Optical Networks

49. A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks.

50. Mitigating jamming attacks in mobile cognitive networks through time hopping.

Catalog

Books, media, physical & digital resources