Search

Your search keyword '"TELECOMMUNICATION security"' showing total 48 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security" Publication Year Range This year Remove constraint Publication Year Range: This year
48 results on '"TELECOMMUNICATION security"'

Search Results

1. Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea.

2. Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea

3. End‐to‐end demonstration for CubeSatellite quantum key distribution

4. Optimisation of energy efficiency of ambient backscatter communication and reconfigurable intelligent surfaces in non‐orthogonal multiple access downlink

5. Optimisation of energy efficiency of ambient backscatter communication and reconfigurable intelligent surfaces in non‐orthogonal multiple access downlink.

6. U.S.-China 5G Competition, the Economy-Security Nexus, and Asia.

7. Fake Base Station Detection and Link Routing Defense †.

8. Quantum computing applications for Internet of Things

9. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

10. Malicious domain detection based on semi‐supervised learning and parameter optimization

11. SAFETY Within the Correctional Community-With Regards to Incoming Publications.

12. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

13. Malicious domain detection based on semi‐supervised learning and parameter optimization.

14. Specific emitter identification under extremely small sample conditions via chaotic integration

15. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

16. Quantum Key Distribution for V2I communications with software‐defined networking

17. Implementation of Italian industry 4.0 quantum testbed in Turin

18. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model

19. Specific emitter identification under extremely small sample conditions via chaotic integration.

20. Multi-attribute quantum group decision-making method considering decision-makers' risk attitude.

21. MECHANISM FOR INFORMATION SUPPORTING THE FINANCIAL AND ECONOMIC SECURITY OF INFORMATION AND TELECOMMUNICATION ENTERPRISES UNDER THE INFLUENCE OF MODERN CYBER THREATS.

22. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.

23. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model.

24. Standardization Trends Related to Application- and Service-related Technologies.

25. WVC: Towards Secure Device Paring for Mobile Augmented Reality.

26. A coding scheme to force the eavesdropper falling in error avalanche

27. IN BRIEF.

28. A coding scheme to force the eavesdropper falling in error avalanche.

29. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism

30. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism.

31. Is smart tech the smartest of purchases?

32. FCC to soon announce lead administrator for cyber assurance program.

33. SEALSQ's Secure Digital Identity Ecosystem, Designed to Fortify 5G Networks Against Cyber Threats, Safeguards User Privacy and Upholds Data Sovereignty.

34. "Hearing Device And Method Of Updating A Hearing Device" in Patent Application Approval Process (USPTO 20240340600).

35. Telecom is already preparing for future quantum threats.

36. Patent Issued for Providing a first digital certificate and a DNS response (USPTO 12081679).

38. Patent Issued for Near-field communication security for medical device and sheath (USPTO 12053279).

39. Patent Issued for Hearing device and method of updating a hearing device (USPTO 12041419).

40. NATO Backs Effort to Save Internet by Rerouting to Space in Event of Subsea Attacks.

41. India, UK launch joint tech security initiative.

42. The central government takes action against an electricity KYC update scam, blocking 392 mobile phones involved.

43. UK bans device passwords that are easy to guess.

44. Patent Issued for Systems, apparatuses and methods for medical device communication with one or more remote devices (USPTO 11935638).

45. India Ends Free Border Movement With Myanmar, Citing Security.

46. Exit interview: Kemba Walden talks advancing cyber — and becoming a role model — in government.

47. Satellite Cyber Security - the Last 'Final Frontier'.

48. Apple: Five years, that's what you've got.

Catalog

Books, media, physical & digital resources