Security vulnerabilities of cyberphysical unmanned aircraft systems
RM Fouda - IEEE Aerospace and Electronic Systems …, 2018 - ieeexplore.ieee.org
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many
industries in the global market, with the Federal Aviation Administration (FAA) predicting no …
industries in the global market, with the Federal Aviation Administration (FAA) predicting no …
Performance analysis and evaluation of RF jamming in IoT networks
Jamming attacks, as a form of a denial-of-service attack, significantly degrade the
performance of wireless communication systems and can lead to significant overhead in …
performance of wireless communication systems and can lead to significant overhead in …
Prioritized secondary user access control in cognitive radio networks
In cognitive radio networks, a secondary user access control (SUAC) technique has been
utilized to improve network management and system security, in which a jamming signal is …
utilized to improve network management and system security, in which a jamming signal is …
Jamrf: Performance analysis, evaluation, and implementation of rf jamming over wi-fi
Jamming attacks significantly degrade the performance of wireless communication systems
and can lead to significant overhead in terms of re-transmissions and increased power …
and can lead to significant overhead in terms of re-transmissions and increased power …
[HTML][HTML] The research of interference recognition method in multi-nodes cooperative frequency-hopping communication based on time–frequency image analysis and …
Q Zhao, S Han, CJ Guo - Physical Communication, 2024 - Elsevier
Interference recognition has a significant and irreplaceable importance in keeping battlefield
communication reliability and securing information safety. However, the existing recognition …
communication reliability and securing information safety. However, the existing recognition …
Secondary user access control in cognitive radio networks
Spectrum sharing and aggregation among authorized secondary users (A-SUs) are
important tasks in operating effective cognitive radio networks. Furthermore, in protecting …
important tasks in operating effective cognitive radio networks. Furthermore, in protecting …
Performance of mimo ieee802. 11n wlan in presence of qpsk jammer with inphase/quadrature origin offsets
EM Shaheen - Wireless Personal Communications, 2020 - Springer
In this paper a novel jamming technique is presented. The idea of the proposed jamming
technique is based on adding inphase and quadrature impairments to the jamming signal …
technique is based on adding inphase and quadrature impairments to the jamming signal …
Spectral efficiency comparison of asynchronous MC-CDMA, MC DS-CDMA and MT-CDMA with carrier frequency offset
J Ahmed - Arabian Journal for Science and Engineering, 2019 - Springer
Multicarrier code-division multiple access (MC-CDMA), multicarrier direct-sequence CDMA
(MC DS-CDMA) and multitone CDMA (MT-CDMA) are three flavors of spread spectrum …
(MC DS-CDMA) and multitone CDMA (MT-CDMA) are three flavors of spread spectrum …
Исследование алгоритма синхронизации ПСП для систем связи с многочастотными сигналами с помощью компьютерного моделирования
ВИ Лойко, ФГ Хисамов, МВ Милованов… - Политематический …, 2015 - cyberleninka.ru
Целью данной работы является экспериментальное исследование алгоритма
синхронизации ПСП для систем связи с многочастотными сигналами MC-DS-CDMA, не …
синхронизации ПСП для систем связи с многочастотными сигналами MC-DS-CDMA, не …
Secondary user access control with MassiveMIMO in cognitive radio networks
We consider the problem of secondary user access control (SUAC) in cognitive radio (CR)
networks with the massive multiple-input multiple-output (MIMO) technique, where a primary …
networks with the massive multiple-input multiple-output (MIMO) technique, where a primary …