Search

Your search keyword '"TELECOMMUNICATION security"' showing total 43 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security" Publisher wiley Remove constraint Publisher: wiley
43 results on '"TELECOMMUNICATION security"'

Search Results

1. Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea

2. End‐to‐end demonstration for CubeSatellite quantum key distribution

3. Optimisation of energy efficiency of ambient backscatter communication and reconfigurable intelligent surfaces in non‐orthogonal multiple access downlink

4. Quantum computing applications for Internet of Things

5. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

6. Malicious domain detection based on semi‐supervised learning and parameter optimization

7. Specific emitter identification under extremely small sample conditions via chaotic integration

8. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

9. Quantum Key Distribution for V2I communications with software‐defined networking

10. Implementation of Italian industry 4.0 quantum testbed in Turin

11. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model

12. A coding scheme to force the eavesdropper falling in error avalanche

13. Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution

14. Modular quantum circuits for secure communication

15. Quantum protocol for decision making and verifying truthfulness among N‐quantum parties: Solution and extension of the quantum coin flipping game

16. Secure transmission for reconfigurable intelligent surface assisted communication with CV‐DDPG

17. Null‐space beamforming strategy for secrecy rate balancing of two‐way MIMO relay networks

18. Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission

19. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism

20. Energy‐efficient covert communication with adaptive assist nodes group

21. Experimentation framework for wireless communication systems under jamming scenarios

22. A secure and efficient range query method for two‐layer wireless sensor networks

23. GNSS induced spoofing simulation based on path planning

24. Quantum information splitting of an arbitrary three‐qubit state by using three sets of GHZ states

25. Key generation schemes for channel authentication in quantum key distribution protocol

26. Lightweight models for detection of denial‐of‐service attack in wireless sensor networks

27. Assessing DER network cybersecurity defences in a power-communication co-simulation environment

28. Hybrid data-driven physics model-based framework for enhanced cyber-physical smart grid security

29. Performance analysis of one-step prediction-based cognitive jamming in jammer-radar countermeasure model

30. Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids

31. Computationally efficient mutual authentication protocol for remote infant incubator monitoring system

32. Efficient proxy ring signature for VANET

33. Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm

34. Stackelberg game for price and power control in secure cooperative relay network

35. Power system effects and mitigation recommendations for DER cyberattacks

36. GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment

37. State space model-based trust evaluation over wireless sensor networks: an iterative particle filter approach

38. Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

39. Eavesdropping near-field contactless payments: a quantitative analysis

40. Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

41. Report: Some recent developments in network economics

42. Computationally efficient mutual authentication protocol for remote infant incubator monitoring system.

43. Eavesdropping near-field contactless payments: a quantitative analysis

Catalog

Books, media, physical & digital resources