Found: 27
Select item for more details and to access through your institution.
Identification of IoT Devices Based on Hardware and Software Fingerprint Features.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 7, p. 846, doi. 10.3390/sym16070846
- By:
- Publication type:
- Article
Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 249, doi. 10.3390/sym16020249
- By:
- Publication type:
- Article
Radio Frequency Fingerprint-Based DSRC Intelligent Vehicle Networking Identification Mechanism in High Mobility Environment.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 9, p. 5037, doi. 10.3390/su14095037
- By:
- Publication type:
- Article
Generative adversarial network-based rogue device identification using differential constellation trace figure.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13638-021-01950-2
- By:
- Publication type:
- Article
A coding scheme to force the eavesdropper falling in error avalanche.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2024, v. 60, n. 10, p. 1, doi. 10.1049/ell2.13200
- By:
- Publication type:
- Article
Time-Delay Estimation in the Multi-Path Channel based on Maximum Likelihood Criterion.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 4, p. 1063, doi. 10.3837/tiis.2012.04.006
- By:
- Publication type:
- Article
Physical layer identification of LoRa devices using constellation trace figure.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1542-x
- By:
- Publication type:
- Article
A Novel Secret Key Generation Method in OFDM System for Physical Layer Security.
- Published in:
- International Journal of Interdisciplinary Telecommunications & Networking, 2016, v. 8, n. 1, p. 21, doi. 10.4018/IJITN.2016010103
- By:
- Publication type:
- Article
A Physical Layer Key Generation Scheme Based on Deep Learning Compensation and Balanced Vector Quantization.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/4911338
- By:
- Publication type:
- Article
The global social insurance movement since the 1880s.
- Published in:
- Journal of Global History, 2010, v. 5, n. 1, p. 125, doi. 10.1017/S1740022809990350
- By:
- Publication type:
- Article
An Efficient Transmitter Feature Extraction Scheme with IQ Imbalance and Nonlinearity in TDD OFDM Systems.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 19, p. 4108, doi. 10.3390/electronics12194108
- By:
- Publication type:
- Article
A Non-Destructive Method for Hardware Trojan Detection Based on Radio Frequency Fingerprinting.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 22, p. 3776, doi. 10.3390/electronics11223776
- By:
- Publication type:
- Article
Wireless Key Generation Scheme Based on Random Permutation and Perturbation in Quasistatic Environments.
- Published in:
- Wireless Communications & Mobile Computing, 2023, p. 1, doi. 10.1155/2023/6980619
- By:
- Publication type:
- Article
Protective immunity elicited by measles vaccine exerts anti-tumor effects on measles virus hemagglutinin gene-modified cancer cells in a mouse model.
- Published in:
- Journal of Cancer Research & Clinical Oncology, 2018, v. 144, n. 10, p. 1945, doi. 10.1007/s00432-018-2720-7
- By:
- Publication type:
- Article
Efficient trust chain model based on turing machine.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 1, p. 2, doi. 10.1002/sec.808
- By:
- Publication type:
- Article
Special issue on recent advances in network and information security-security and communication networks journal.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Special Issue on 'Recent Advances in Network and Information Security'.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 11, p. i, doi. 10.1002/sec.579
- By:
- Publication type:
- Article
A Hybrid Information Reconciliation Method for Physical Layer Key Generation.
- Published in:
- Entropy, 2019, v. 21, n. 7, p. 688, doi. 10.3390/e21070688
- By:
- Publication type:
- Article
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
- Published in:
- Entropy, 2019, v. 21, n. 5, p. 497, doi. 10.3390/e21050497
- By:
- Publication type:
- Article
Trusted mobile model based on DTE technology.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 5, p. 457, doi. 10.1007/s10207-014-0266-5
- By:
- Publication type:
- Article
A novel point mutation in exon 20 of EGFR showed sensitivity to erlotinib.
- Published in:
- Medical Oncology, 2014, v. 31, n. 7, p. 1, doi. 10.1007/s12032-014-0036-2
- By:
- Publication type:
- Article
Task-Oriented Network Abnormal Behavior Detection Method.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3105291
- By:
- Publication type:
- Article
Welfare reform in East Asia: Towards workfare?
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Power Ramped-up Preamble RF Fingerprints of Wireless Transmitters.
- Published in:
- Radioengineering, 2011, v. 20, n. 3, p. 703
- By:
- Publication type:
- Article
A LoRa-Based Lightweight Secure Access Enhancement System.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3530509
- By:
- Publication type:
- Article
Phylogenetic Analysis of a ‘Jewel Orchid’ Genus Goodyera (Orchidaceae) Based on DNA Sequence Data from Nuclear and Plastid Regions.
- Published in:
- PLoS ONE, 2016, v. 11, n. 2, p. 1, doi. 10.1371/journal.pone.0150366
- By:
- Publication type:
- Article
The Global Spread of Neoliberalism and China's Pension Reform since 1978.
- Published in:
- Journal of World History, 2012, v. 23, n. 3, p. 609, doi. 10.1353/jwh.2012.0071
- By:
- Publication type:
- Article