Works matching DE "WIRELESS communications security"
Results: 206
Performance Enhancement of Fiber Optic and Optical Wireless Communication Channels by Using Forward Error Correction Codes.
- Published in:
- Journal of Optical Communications, 2024, v. 45, n. 1, p. s97, doi. 10.1515/joc-2019-0191
- By:
- Publication type:
- Article
On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 60, doi. 10.3390/fi17020060
- By:
- Publication type:
- Article
A message verification scheme based on physical layer-enabled data hiding for flying ad hoc network.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 77165, doi. 10.1007/s11042-024-18342-5
- By:
- Publication type:
- Article
Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 10, p. 1597, doi. 10.3390/math12101597
- By:
- Publication type:
- Article
Preface to the Special Issue on "Mathematical Methods for Computer Science".
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3608, doi. 10.3390/math11163608
- By:
- Publication type:
- Article
ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 6, p. 1446, doi. 10.3390/math11061446
- By:
- Publication type:
- Article
On the Physical Layer Security Peculiarities of Wireless Communications in the Presence of the Beaulieu-Xie Shadowed Fading.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 20, p. 3724, doi. 10.3390/math10203724
- By:
- Publication type:
- Article
Enhancing Industrial Robot Arms Data Security with a Hybrid Encryption Approach.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2024, v. 28, n. 4, p. 756, doi. 10.16984/saufenbilder.1440949
- By:
- Publication type:
- Article
人工噪声辅助的多用户安全传输方法.
- Published in:
- Telecommunication Engineering, 2022, v. 62, n. 3, p. 348, doi. 10.3969/j.issn.1001-893x.2022.03.012
- By:
- Publication type:
- Article
ChessCrypt: enhancing wireless communication security in smart cities through dynamically generated S-Box with chess-based nonlinearity.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-77927-0
- By:
- Publication type:
- Article
A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.
- Published in:
- Future Internet, 2024, v. 16, n. 2, p. 56, doi. 10.3390/fi16020056
- By:
- Publication type:
- Article
Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance.
- Published in:
- Future Internet, 2020, v. 12, n. 10, p. 170, doi. 10.3390/fi12100170
- By:
- Publication type:
- Article
Security and Privacy in Wireless and Mobile Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 2, p. 18, doi. 10.3390/fi10020018
- By:
- Publication type:
- Article
How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats.
- Published in:
- International Review on Computers & Software, 2017, v. 12, n. 6, p. 238, doi. 10.15866/irecos.v12i6.16858
- By:
- Publication type:
- Article
Secret key generation for reconfigurable intelligent surface‐assisted MISO multi‐user system.
- Published in:
- IET Communications (Wiley-Blackwell), 2024, v. 18, n. 20, p. 1741, doi. 10.1049/cmu2.12853
- By:
- Publication type:
- Article
A lightweight encryption and message authentication framework for wireless communication.
- Published in:
- IET Communications (Wiley-Blackwell), 2023, v. 17, n. 3, p. 265, doi. 10.1049/cmu2.12535
- By:
- Publication type:
- Article
A turbo‐based encryption and coding scheme for multiple‐input multiple‐output orthogonal frequency division multiplexing wireless communication systems affected by Doppler frequency offset.
- Published in:
- IET Communications (Wiley-Blackwell), 2023, v. 17, n. 4, p. 632, doi. 10.1049/cmu2.12568
- By:
- Publication type:
- Article
Capacity and outage probability analysis of asymmetric dual-hop RF--FSO communication systems.
- Published in:
- IET Communications (Wiley-Blackwell), 2018, v. 12, n. 16, p. 1979, doi. 10.1049/iet-com.2017.0982
- By:
- Publication type:
- Article
Mobile physical layer spoofing detection based on sparse representation.
- Published in:
- IET Communications (Wiley-Blackwell), 2018, v. 12, n. 14, p. 1709, doi. 10.1049/iet-com.2017.0829
- By:
- Publication type:
- Article
Intrusion Detection System and Neutrosophic Theory for MANETs: A Comparative Study.
- Published in:
- Neutrosophic Sets & Systems, 2018, v. 23, p. 16
- By:
- Publication type:
- Article
Securing Wireless Networks Against Intruders.
- Published in:
- CPA Journal, 2005, v. 75, n. 4, p. 68
- By:
- Publication type:
- Article
Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment.
- Published in:
- Mobile Networks & Applications, 2023, v. 28, n. 6, p. 2191, doi. 10.1007/s11036-023-02176-w
- By:
- Publication type:
- Article
Optimization Schemes for Protective Jamming.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 45, doi. 10.1007/s11036-013-0483-6
- By:
- Publication type:
- Article
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2439, doi. 10.1007/s11276-024-03674-9
- By:
- Publication type:
- Article
Pilot spoofing detection based on pilot random block encryption.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 2, p. 973, doi. 10.1007/s11276-023-03539-7
- By:
- Publication type:
- Article
Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 8, p. 3479, doi. 10.1007/s11276-023-03422-5
- By:
- Publication type:
- Article
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 1, p. 403, doi. 10.1007/s11276-022-03144-0
- By:
- Publication type:
- Article
6G wireless communication assisted security management using cloud edge computing.
- Published in:
- Expert Systems, 2023, v. 40, n. 4, p. 1, doi. 10.1111/exsy.13061
- By:
- Publication type:
- Article
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1127, doi. 10.2298/CSIS130921068W
- By:
- Publication type:
- Article
Asymmetric Turbo Code for Coded-Cooperative Wireless Communication Based on Matched Interleaver with Channel Estimation and Multi-Receive Antennas at the Destination.
- Published in:
- Radioengineering, 2017, v. 26, n. 3, p. 878, doi. 10.13164/re.2017.0878
- By:
- Publication type:
- Article
Specific emitter identification based on ensemble domain adversarial neural network in multi-domain environments.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13634-024-01138-y
- By:
- Publication type:
- Article
Countermeasure to protect sensitive information stealthily in remote interchanges using steganography in educational environments.
- Published in:
- International Journal of Electrical Engineering Education, 2021, v. 58, n. 2, p. 428, doi. 10.1177/0020720918825239
- By:
- Publication type:
- Article
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5569745
- By:
- Publication type:
- Article
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 1, p. 31, doi. 10.3390/info16010031
- By:
- Publication type:
- Article
Software Platform for the Comprehensive Testing of Transmission Protocols Developed in GNU Radio.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 1, p. 62, doi. 10.3390/info15010062
- By:
- Publication type:
- Article
INTRODUCTION TO THE SPECIAL ISSUE: NETWORK MANAGEMENT IN DISTRIBUTED SYSTEMS.
- Published in:
- Scalable Computing: Practice & Experience, 2010, v. 11, n. 4, p. 329
- By:
- Publication type:
- Article
VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead.
- Published in:
- Journal of Sensors, 2018, p. 1, doi. 10.1155/2018/6576841
- By:
- Publication type:
- Article
A Novel Ultra-Miniaturized Angularly Stable Frequency Selective Surface for L-Band Shielding Applications.
- Published in:
- International Journal of Antennas & Propagation, 2024, v. 2024, p. 1, doi. 10.1155/2024/8777541
- By:
- Publication type:
- Article
An Indoor Unknown Radio Emitter Positioning Approach Using Improved RSSD Location Fingerprinting.
- Published in:
- International Journal of Antennas & Propagation, 2023, p. 1, doi. 10.1155/2023/5462081
- By:
- Publication type:
- Article
Detection of jamming attacks in 802.11b wireless networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2013, v. 2013, n. 1, p. 1, doi. 10.1186/1687-1499-2013-208
- By:
- Publication type:
- Article
Virus propagation power of the dynamic network.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2013, v. 2013, n. 1, p. 1, doi. 10.1186/1687-1499-2013-210
- By:
- Publication type:
- Article
Is Your Email Secure?
- Published in:
- Journal of Financial Planning, 2012, v. 25, n. 3, p. 42
- By:
- Publication type:
- Article
Tightening the Net.
- Published in:
- Government Technology, 2010, v. 23, n. 6, p. 20
- By:
- Publication type:
- Article
Polarization Modulation for Wireless Communications Based on Metasurfaces.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 36, p. 1, doi. 10.1002/adfm.202103379
- By:
- Publication type:
- Article
Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response.
- Published in:
- IET Signal Processing (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/8884688
- By:
- Publication type:
- Article
A novel security‐based adaptive reconfigurable intelligent surfaces assisted clustering strategy.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2024, v. 60, n. 17, p. 1, doi. 10.1049/ell2.70008
- By:
- Publication type:
- Article
Covert communications with channel inversion power control in uplink NOMA systems.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2021, v. 57, n. 9, p. 360, doi. 10.1049/ell2.12132
- By:
- Publication type:
- Article
System-Level Digital Twin Modeling for Underwater Wireless IoT Networks.
- Published in:
- Journal of Marine Science & Engineering, 2025, v. 13, n. 1, p. 32, doi. 10.3390/jmse13010032
- By:
- Publication type:
- Article
A SCOPE FOR MANET ROUTING AND SECURITY THREATS.
- Published in:
- ICTACT Journal on Communication Technology, 2013, v. 4, n. 4, p. 840, doi. 10.21917/ijct.2013.0119
- By:
- Publication type:
- Article
A novel slotted antenna design for future Terahertz applications.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 3, p. 2708, doi. 10.11591/ijece.v14i3.pp2708-2716
- By:
- Publication type:
- Article