Predatory Pricing: Strategic Theory and Legal Policy [PDF]
Bolton, P., Brodley, J.F., Riordan, M.H.
core +1 more source
A Novel Architecture for Mitigating Botnet Threats in AI-Powered IoT Environments. [PDF]
Memos VA +4 more
europepmc +1 more source
Research on Optimal Convergence Design of Low Intercept Point-Like Beam for FDA-MIMO Radio Detector Based on Beam Entropy. [PDF]
Jia J +5 more
europepmc +1 more source
Reclaiming Social Media: A Weird Stance against the Social Marketplace [PDF]
Houldcroft, Andrew
core +1 more source
Unimodular Multi-Input Multi-Output Waveform and Mismatch Filter Design for Saturated Forward Jamming Suppression. [PDF]
Fang X, Zhao D, Zhang L.
europepmc +1 more source
Performance Experiment of the Angle Deception of Cross-Eye Jamming against a Monopulse Sensor
Yeonsoo Jang +5 more
openalex +1 more source
A Review on Radar-Based Human Detection Techniques. [PDF]
Buyukakkaslar MT, Erturk MA, Aydin MA.
europepmc +1 more source
Extended dissipative truncated predictive control strategy for conic-type delayed networked control systems affected by cyber attacks and sensor distortion. [PDF]
Narenshakthi T, Dharani S.
europepmc +1 more source
An Efficient SAR Raw Signal Simulator Accounting for Large Trajectory Deviation. [PDF]
Dai S +5 more
europepmc +1 more source
Multiple Targets Deception Jamming Against ISAR Based on Periodic 0- $\pi$ Phase Modulation
Qingzhan Shi +3 more
openalex +1 more source

