Search

Your search keyword '"TELECOMMUNICATION security"' showing total 2,202 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security"
2,202 results on '"TELECOMMUNICATION security"'

Search Results

1. Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea.

2. Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea

3. End‐to‐end demonstration for CubeSatellite quantum key distribution

4. Optimisation of energy efficiency of ambient backscatter communication and reconfigurable intelligent surfaces in non‐orthogonal multiple access downlink

5. Optimisation of energy efficiency of ambient backscatter communication and reconfigurable intelligent surfaces in non‐orthogonal multiple access downlink.

6. U.S.-China 5G Competition, the Economy-Security Nexus, and Asia.

7. Fake Base Station Detection and Link Routing Defense †.

8. Quantum computing applications for Internet of Things

9. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

10. Malicious domain detection based on semi‐supervised learning and parameter optimization

11. SAFETY Within the Correctional Community-With Regards to Incoming Publications.

12. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

13. Malicious domain detection based on semi‐supervised learning and parameter optimization.

14. Specific emitter identification under extremely small sample conditions via chaotic integration

15. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

16. Quantum Key Distribution for V2I communications with software‐defined networking

17. Implementation of Italian industry 4.0 quantum testbed in Turin

18. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model

19. Specific emitter identification under extremely small sample conditions via chaotic integration.

20. Multi-attribute quantum group decision-making method considering decision-makers' risk attitude.

21. MECHANISM FOR INFORMATION SUPPORTING THE FINANCIAL AND ECONOMIC SECURITY OF INFORMATION AND TELECOMMUNICATION ENTERPRISES UNDER THE INFLUENCE OF MODERN CYBER THREATS.

22. VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.

23. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model.

24. Standardization Trends Related to Application- and Service-related Technologies.

25. WVC: Towards Secure Device Paring for Mobile Augmented Reality.

26. A coding scheme to force the eavesdropper falling in error avalanche

27. Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution

28. Modular quantum circuits for secure communication

29. Quantum protocol for decision making and verifying truthfulness among N‐quantum parties: Solution and extension of the quantum coin flipping game

30. Secure transmission for reconfigurable intelligent surface assisted communication with CV‐DDPG

31. Null‐space beamforming strategy for secrecy rate balancing of two‐way MIMO relay networks

32. Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission

33. IN BRIEF.

34. A coding scheme to force the eavesdropper falling in error avalanche.

36. Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

37. Revisit two memoryless state‐recovery cryptanalysis methods on A5/1

38. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism

39. On the Security of Quantum Key Distribution Networks.

40. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response †.

41. Secure transmission for reconfigurable intelligent surface assisted communication with CV‐DDPG.

42. Null‐space beamforming strategy for secrecy rate balancing of two‐way MIMO relay networks.

43. A Scheme for Quantum Teleportation and Remote Quantum State Preparation of IoT Multiple Devices.

44. Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission.

45. OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0.

46. METHOD OF INFORMATION PROTECTION BASED ON THE INTEGRATION OF PROBABILISTIC ENCRYPTION AND NOISE IMMUNE CODING.

47. Manoeuvre Warfare and the Electromagnetic Spectrum.

48. Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices.

49. Energy‐efficient covert communication with adaptive assist nodes group

50. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism.

Catalog

Books, media, physical & digital resources