Results 81 to 90 of about 4,682 (204)

Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming

open access: yesIEEE Access, 2019
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li   +4 more
doaj   +1 more source

Secrecy Outage Analysis Over Fluctuating Two-Ray Fading Channels

open access: yes, 2019
In this letter, we analyze the secrecy outage probability (SOP) over fluctuating two-ray fading channels but with a different definition from the one adopted in [5].
Alouini, Mohamed-Slim   +3 more
core   +1 more source

Blame and Cost: Understanding Responsibility Attribution and Financial Risk in AI Usage

open access: yesJournal of Contingencies and Crisis Management, Volume 34, Issue 1, March 2026.
ABSTRACT This study examines public perceptions of responsibility and potential damage associated with AI usage across various scenarios, and estimates the financial impact on firms. The survey‐based analyses of AI failures evaluating hypothetical risk scenarios and their economic consequences reveal that sociodemographic determinants shape the ...
Dorian Fildor   +2 more
wiley   +1 more source

Reciprocally-Benefited Secure Transmission for Spectrum Sensing-Based Cognitive Radio Sensor Networks

open access: yesSensors, 2016
The rapid proliferation of independently-designed and -deployed wireless sensor networks extremely crowds the wireless spectrum and promotes the emergence of cognitive radio sensor networks (CRSN).
Dawei Wang   +4 more
doaj   +1 more source

On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks

open access: yes, 2011
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of ...
Andrews, Jeffrey G.   +3 more
core   +1 more source

Harnessing Data for Flood Prediction: A Systematic Review of Forecasting Techniques and Information Sources

open access: yesJournal of Flood Risk Management, Volume 19, Issue 1, March 2026.
ABSTRACT Flood forecasting has undergone significant development over the past two decades, with researchers exploring a range of innovative approaches to quantify both the hazards and risks associated with flood events across a range of magnitudes and frequencies.
Amirali Davary   +3 more
wiley   +1 more source

On the Secrecy Performance of Land Mobile Satellite Communication Systems

open access: yesIEEE Access, 2018
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas ...
Kang An   +3 more
doaj   +1 more source

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

open access: yes, 2015
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core   +1 more source

Flood Risk Assessment of Urban Critical Infrastructures Using Crowd‐Sourced and Open Data on Hazard, Exposure and Vulnerability

open access: yesJournal of Flood Risk Management, Volume 19, Issue 1, March 2026.
ABSTRACT Worldwide, cities rely on the proper functioning of critical infrastructures (CIs) such as electricity, telecommunication, water supply and transportation. Failure of those infrastructures can lead to significant and long‐lasting impacts, even far beyond the flooded areas due to cascading effects.
Andreas Burzel   +2 more
wiley   +1 more source

Zero-Outage Secrecy in Short Packet IoT-Aided Cellular Cooperative Network With EH-NOMA

open access: yesIEEE Access
The zero-outage secrecy with energy harvesting is considered in short packet IoT-aided cellular cooperative networks using the inspired non-orthogonal multiple access (NOMA) strategy.
Hien Quang Ta   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy