Results 91 to 100 of about 1,051 (211)
Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks
In Cognitive Radio (CR) networks combined with Energy Harvesting (EH) technology, Secondary Users (SUs) are vulnerable to jamming attacks when sensing idle channels.
Haifeng Hou +4 more
doaj +1 more source
Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the ...
Chu, Nam H. +7 more
core
JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds
With the development of digital devices, the recording process has become increasingly easier to conduct. However, the portability of the recording devices has also made recording difficult to monitor.
Hao Shen +4 more
doaj +1 more source
Total Secrecy From Anti-Eavesdropping Channel Estimation
Shuo Wu, Yingbo Hua
openaire +3 more sources
Improvement of anti-eavesdropping performance of spatially selective modulation by transmitting antenna selection [PDF]
空間選択性変調方式(SSM)の盗聴耐性の改善について検討する。SSMはマルチパスフェージングチャネルの可逆性と場所依存性を利用することで、盗聴局での受信を回避し、正規受信局にのみ秘密情報送信を実現する。本論文では、SSMの盗聴耐性を向上させるために送信アンテナのランダム選択を提案する。本方式では、複数の送信アンテナをランダムに選択し、その組み合わせを時間的に変化させる。本方式は、常に正規受信局と相関の高いチャネルを有する盗聴局位置の発生を抑制する ...
0000-0003-3066-648X +15 more
core +1 more source
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Trojans inject systems and launch various attacks, such as eavesdropping secret information, tampering with system configuration etc., which threats to system security seriously.
Weifu Zou +3 more
doaj +2 more sources
Predator-prey interactions take place in complex environments, and research on the sensory ecology of predator-detection relies on understanding when, where, and how prey experience and respond to predator cues.
Laurel B. Symes +6 more
doaj +1 more source
Auditory risk recognition is socially transmitted across territory borders in wild birds
Prey species commonly assess predation risk based on acoustic signals, such as predator vocalizations or heterospecific alarm calls. The resulting risk-sensitive decision-making affects not only the behavior and life-history of individual prey, but also ...
Jakub Szymkowiak
doaj +1 more source
Ultraviolet Network Coverage Based on Non-Line-of-Sight Channel
Ultraviolet (UV) networks, owing to their advantages of low eavesdropping rates, low background noise, strong anti-interference abilities, and non–line-of-sight (NLOS) communication, have high prospects for application in the complex ...
Cheng Li +4 more
doaj +1 more source
This paper proposes a multi-channel parallel mode shift keying secure communication scheme based on multi-mode chaotic laser synchronization, aiming to address the issues of structural complexity and low transmission rates in traditional chaos shift ...
Yuehua An +3 more
doaj +1 more source

