Results 31 to 40 of about 15,368 (178)

Vulnerability analysis of satellite-based synchronized smart grids monitoring systems [PDF]

open access: yes, 2014
The large-scale deployment of wide-area monitoring systems could play a strategic role in supporting the evolution of traditional power systems toward smarter and self-healing grids. The correct operation of these synchronized monitoring systems requires
Ahmed faheem Zobaa   +19 more
core   +1 more source

Optimal distributed cooperative jamming resource allocation for multi‐missile threat scenario

open access: yesIET Radar, Sonar & Navigation, 2022
Jamming resources allocation (JRA) is an essential task in clustered combat environments. Especially in cases with multiple threats, efficient JRA is imperative for protecting key assets.
Zhaodong Wu   +3 more
doaj   +1 more source

Critical scaling for yield is independent from distance to isostaticity [PDF]

open access: yes, 2019
Using discrete element simulations, we demonstrate that critical behavior for yielding in soft disk and sphere packings is independent of distance to isostaticity over a wide range of dimensionless pressures.
Clark, Abram H., Thompson, Jacob D.
core   +2 more sources

Secure Communication with a Wireless-Powered Friendly Jammer [PDF]

open access: yes, 2014
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman   +3 more
core   +2 more sources

Physical layer security with uncoordinated helpers implementing cooperative jamming [PDF]

open access: yes2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM), 2012
4 pages, 4 figures ...
Luo, Shuangyu   +2 more
openaire   +2 more sources

Null-Steering Beamforming for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

open access: yesIEEE Access, 2019
This paper addresses enhancing the physical layer security of a downlink non-orthogonal multiple access systems. The proposed scheme consists of a base station, multiple legitimate users, and an eavesdropper.
Yamen Alsaba   +2 more
doaj   +1 more source

Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays

open access: yes, 2018
A downlink single-input single-output non-orthogonal multiple access system is considered in which a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper.
Arafa, Ahmed   +3 more
core   +1 more source

Mobile Jammers for Secrecy Rate Maximization in Cooperative Networks [PDF]

open access: yes, 2013
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted.
Chatzipanagiotis, Nikolaos   +3 more
core   +2 more sources

Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]

open access: yes, 2012
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core   +2 more sources

STBC-Enabled Secure Wireless Transmission With Cooperative Devices Under Imperfect CSI of Destination

open access: yesIEEE Access, 2023
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from a source to a destination assisted by cooperative devices. In the first phase, a space-time block code (STBC) is employed; thus,
Tianji Shen, Yuto Hama, Hideki Ochiai
doaj   +1 more source

Home - About - Disclaimer - Privacy