Works matching Eavesdropping
Results: 1929
Proactive Eavesdropping via Pilot Contamination and Jamming.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 3, p. 1405, doi. 10.1007/s11277-017-5213-0
- By:
- Publication type:
- Article
面向可疑中继通信网络的合法窃听方案.
- Published in:
- Journal of South China University of Technology (Natural Science Edition), 2022, v. 50, n. 10, p. 70, doi. 10.12141/j.issn.1000-565X.210506
- By:
- Publication type:
- Article
多天线主动窃听系统的干扰机优化设计.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2019, v. 36, n. 1, p. 254, doi. 10.19734/j.issn.1001-3695.2017.07.0694
- By:
- Publication type:
- Article
Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check.
- Published in:
- International Journal of Theoretical Physics, 2012, v. 51, n. 4, p. 1211, doi. 10.1007/s10773-011-0997-2
- By:
- Publication type:
- Article
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 1, p. 6, doi. 10.3390/computers14010006
- By:
- Publication type:
- Article
Eavesdropping Interference in Wireless Communication Networks Based on Physical Layer Security.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 9, p. 395, doi. 10.14569/ijacsa.2024.0150939
- By:
- Publication type:
- Article
Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas.
- Published in:
- Wireless Networks (10220038), 2019, v. 25, n. 6, p. 3205, doi. 10.1007/s11276-018-1713-4
- By:
- Publication type:
- Article
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas.
- Published in:
- Wireless Networks (10220038), 2017, v. 23, n. 2, p. 355, doi. 10.1007/s11276-015-1160-4
- By:
- Publication type:
- Article
Proactive eavesdropping in UAV-aided mobile relay systems.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13638-020-1650-7
- By:
- Publication type:
- Article
Robust proactive eavesdropping in UAV-enabled wireless communication networking.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. 1, doi. 10.1186/s13638-019-1599-6
- By:
- Publication type:
- Article
KNOWING TOO MUCH ABOUT OTHERS: MODERATORS OF THE RELATIONSHIP BETWEEN EAVESDROPPING AND RAPPORT IN SOCIAL INTERACTION.
- Published in:
- Journal of Nonverbal Behavior, 2004, v. 28, n. 4, p. 223, doi. 10.1007/s10919-004-4157-8
- By:
- Publication type:
- Article
Tactics of evasion: strategies used by signallers to deter eavesdropping enemies from exploiting communication systems.
- Published in:
- 2023
- By:
- Publication type:
- Literature Review
Active eavesdropping detection: a novel physical layer security in wireless IoT.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13634-023-01080-5
- By:
- Publication type:
- Article
Statistical intrusion detection and eavesdropping in quantum channels with coupling: multiple-preparation and single-preparation methods.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 3, p. 1, doi. 10.1007/s11128-022-03436-6
- By:
- Publication type:
- Article
Enhancing eavesdropping detection in quantum key distribution using disentropy measure of randomness.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 2, p. 1, doi. 10.1007/s11128-022-03422-y
- By:
- Publication type:
- Article
A proactive defense method against eavesdropping attack in SDN-based storage environment.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00255-3
- By:
- Publication type:
- Article
IRS Backscatter-Based Secrecy Enhancement against Active Eavesdropping.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 2, p. 265, doi. 10.3390/electronics13020265
- By:
- Publication type:
- Article
Eavesdropping to Find Mates: The Function of Male Hearing for a Cicada-Hunting Parasitoid Fly, Emblemasoma erro (Diptera: Sarcophagidae).
- Published in:
- Journal of Insect Science, 2016, v. 16, n. 1, p. 1, doi. 10.1093/jisesa/iew048
- By:
- Publication type:
- Article
The eavesdropping risk of conspicuous sexual signaling in humpback whales.
- Published in:
- Behavioral Ecology & Sociobiology, 2021, v. 75, n. 8, p. 1, doi. 10.1007/s00265-021-03048-7
- By:
- Publication type:
- Article
Listening in: the importance of vibratory courtship signals for male eavesdropping in the wolf spider, Schizocosa ocreata.
- Published in:
- Behavioral Ecology & Sociobiology, 2019, v. 73, n. 9, p. N.PAG, doi. 10.1007/s00265-019-2743-3
- By:
- Publication type:
- Article
Olfactory eavesdropping between two competing stingless bee species.
- Published in:
- Behavioral Ecology & Sociobiology, 2011, v. 65, n. 4, p. 763, doi. 10.1007/s00265-010-1080-3
- By:
- Publication type:
- Article
Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 24, p. 8207, doi. 10.3390/s21248207
- By:
- Publication type:
- Article
Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 11, p. 2687, doi. 10.3390/s17112687
- By:
- Publication type:
- Article
On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 5, p. 721, doi. 10.3390/s16050721
- By:
- Publication type:
- Article
A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper.
- Published in:
- Defence Technology, 2019, v. 15, n. 1, p. 95, doi. 10.1016/j.dt.2018.07.001
- By:
- Publication type:
- Article
Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13638-017-0843-1
- By:
- Publication type:
- Article
Variation in female mate preference in response to eavesdropping "interloper" males.
- Published in:
- Behavioral Ecology, 2016, v. 27, n. 6, p. 1609, doi. 10.1093/beheco/arw083
- By:
- Publication type:
- Article
Enhancing Satellite Link Security Against Drone Eavesdropping Through Cooperative Communication.
- Published in:
- International Journal of Satellite Communications & Networking, 2025, v. 43, n. 1, p. 10, doi. 10.1002/sat.1538
- By:
- Publication type:
- Article
The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 7, p. 3414, doi. 10.1007/s10773-016-2969-z
- By:
- Publication type:
- Article
Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Five-Particle Cluster State.
- Published in:
- International Journal of Theoretical Physics, 2012, v. 51, n. 9, p. 2759, doi. 10.1007/s10773-012-1151-5
- By:
- Publication type:
- Article
Social Eavesdropping: A Game-Theoretic Analysis.
- Published in:
- Bulletin of Mathematical Biology, 2007, v. 69, n. 4, p. 1255, doi. 10.1007/s11538-006-9151-3
- By:
- Publication type:
- Article
Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs.
- Published in:
- Journal of Marine Science & Engineering, 2024, v. 12, n. 2, p. 314, doi. 10.3390/jmse12020314
- By:
- Publication type:
- Article
Stranger danger: acoustic response of the Veery ( Catharus fuscescens) via heterospecific eavesdropping on the Tufted Titmouse ( Baeolophus bicolor).
- Published in:
- Wilson Journal of Ornithology, 2018, v. 130, n. 1, p. 168, doi. 10.1676/16-149.1
- By:
- Publication type:
- Article
Administrative Agencies in a Technological Era: Are Eavesdropping and Wiretapping Now Acceptable Without Probable Cause?
- Published in:
- International Journal of Public Administration, 2006, v. 29, n. 14, p. 1397, doi. 10.1080/01900690600954389
- By:
- Publication type:
- Article
LIVENESS, MULTIFOCALITY, AND EAVESDROPPING IN ETHNOMUSICOLOGICAL FIELDWORK RESEARCH AT GHANAIAN FESTIVALS AND ROYAL FUNERALS.
- Published in:
- African Music: Journal for the International Library of African Music, 2020, v. 11, n. 2, p. 101, doi. 10.21504/amj.v11i2.2316
- By:
- Publication type:
- Article
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 4, p. 895, doi. 10.1007/s11128-013-0699-1
- By:
- Publication type:
- Article
One-insider attack of quantum secret sharing protocol with collective eavesdropping-check.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 1, p. 33, doi. 10.1007/s11128-013-0653-2
- By:
- Publication type:
- Article
Towards 5G-based IoT security analysis against Vo5G eavesdropping.
- Published in:
- Computing, 2021, v. 103, n. 3, p. 425, doi. 10.1007/s00607-020-00855-0
- By:
- Publication type:
- Article
Geometrical Optics Restricted Eavesdropping Analysis of Satellite-to-Satellite Secret Key Distillation.
- Published in:
- Entropy, 2021, v. 23, n. 8, p. 950, doi. 10.3390/e23080950
- By:
- Publication type:
- Article
"Wire with something in it from men to men": Robert Frost, the Rural Telephone Network, and the Poetics of Eavesdropping.
- Published in:
- Modernism/Modernity, 2023, v. 30, n. 4, p. 767, doi. 10.1353/mod.2023.a925907
- By:
- Publication type:
- Article
OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION.
- Published in:
- International Journal of Quantum Information, 2009, v. 7, n. 1, p. 297, doi. 10.1142/S0219749909004554
- By:
- Publication type:
- Article
Efficient Congestion Control Utilizing Message Eavesdropping in Asynchronous Range-Based Localization.
- Published in:
- ETRI Journal, 2013, v. 35, n. 1, p. 35, doi. 10.4218/etrij.13.0112.0302
- By:
- Publication type:
- Article
Dominant predator odour triggers caution and eavesdropping behaviour in a mammalian mesopredator.
- Published in:
- Behavioral Ecology & Sociobiology, 2016, v. 70, n. 4, p. 481, doi. 10.1007/s00265-016-2063-9
- By:
- Publication type:
- Article
Shared predators between primate groups and mixed species bird flocks: the potential for forest‐wide eavesdropping networks.
- Published in:
- Oikos, 2022, v. 2022, n. 10, p. 1, doi. 10.1111/oik.08274
- By:
- Publication type:
- Article
Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping.
- Published in:
- International Journal of Distributed Sensor Networks, 2022, v. 18, n. 8, p. 1, doi. 10.1177/15501329221114535
- By:
- Publication type:
- Article
A hybrid prevention method for eavesdropping attack by link spoofing in software-defined Internet of Things controllers.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 11, p. 1, doi. 10.1177/1550147717739157
- By:
- Publication type:
- Article
Assessing the Security of TEMPEST Fonts against Electromagnetic Eavesdropping by Using Different Specialized Receivers.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 8, p. 2828, doi. 10.3390/app10082828
- By:
- Publication type:
- Article
The Origin of Social Evaluation, Social Eavesdropping, Reputation Formation, Image Scoring or What You Will.
- Published in:
- Frontiers in Psychology, 2016, v. 7, p. 1, doi. 10.3389/fpsyg.2016.01772
- By:
- Publication type:
- Article
Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping.
- Published in:
- Entropy, 2024, v. 26, n. 1, p. 64, doi. 10.3390/e26010064
- By:
- Publication type:
- Article
Heterospecific eavesdropping of jays (Garrulus glandarius) on blackbird (Turdus merula) mobbing calls.
- Published in:
- Acta Ethologica, 2022, v. 25, n. 2, p. 101, doi. 10.1007/s10211-022-00391-4
- By:
- Publication type:
- Article