Results 31 to 40 of about 15,368 (178)
Vulnerability analysis of satellite-based synchronized smart grids monitoring systems [PDF]
The large-scale deployment of wide-area monitoring systems could play a strategic role in supporting the evolution of traditional power systems toward smarter and self-healing grids. The correct operation of these synchronized monitoring systems requires
Ahmed faheem Zobaa +19 more
core +1 more source
Optimal distributed cooperative jamming resource allocation for multiāmissile threat scenario
Jamming resources allocation (JRA) is an essential task in clustered combat environments. Especially in cases with multiple threats, efficient JRA is imperative for protecting key assets.
Zhaodong Wu +3 more
doaj +1 more source
Critical scaling for yield is independent from distance to isostaticity [PDF]
Using discrete element simulations, we demonstrate that critical behavior for yielding in soft disk and sphere packings is independent of distance to isostaticity over a wide range of dimensionless pressures.
Clark, Abram H., Thompson, Jacob D.
core +2 more sources
Secure Communication with a Wireless-Powered Friendly Jammer [PDF]
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman +3 more
core +2 more sources
Physical layer security with uncoordinated helpers implementing cooperative jamming [PDF]
4 pages, 4 figures ...
Luo, Shuangyu +2 more
openaire +2 more sources
This paper addresses enhancing the physical layer security of a downlink non-orthogonal multiple access systems. The proposed scheme consists of a base station, multiple legitimate users, and an eavesdropper.
Yamen Alsaba +2 more
doaj +1 more source
Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays
A downlink single-input single-output non-orthogonal multiple access system is considered in which a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper.
Arafa, Ahmed +3 more
core +1 more source
Mobile Jammers for Secrecy Rate Maximization in Cooperative Networks [PDF]
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted.
Chatzipanagiotis, Nikolaos +3 more
core +2 more sources
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core +2 more sources
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from a source to a destination assisted by cooperative devices. In the first phase, a space-time block code (STBC) is employed; thus,
Tianji Shen, Yuto Hama, Hideki Ochiai
doaj +1 more source

