Showing 261 - 280 results of 11,435 for search '"the Jam"', query time: 0.76s Refine Results
  1. 261
  2. 262
    by Chao Zhou, Feifeng Liu, Quanhua Liu
    Published 2017-10-01
    Subjects: ...interrupted sampling repeater jamming...
    Get full text
    Article
  3. 263
  4. 264
  5. 265
    by LEE CHAO TSUNG, 李兆宗
    Published 2001
    ... of frequency hopping systems incurred by jamming for military used. In addition to the jamming model , we...
    Get full text
    Others
  6. 266
  7. 267
    by Chen, Chih-Hao, 陳智豪
    Published 1997
    ... analysis.It is shown that the system combining with Reed-Solomon codes can enhance itsanti-jam...
    Get full text
    Others
  8. 268
    by Shih-Pu Hsu, 徐士卜
    Published 2007
    ... environment. The Jamming attacks are the representative energy-consumption DoS attacks in wireless sensor...
    Get full text
    Others
  9. 269
    by Daqing, Huang, Qiu-Cheng, Xie
    Published 1990
    ... the repeat jamming is presented. The construction and antijamming performance of this technique are described...
    Get full text
    Get full text
  10. 270
    by Wu, Jingqi
    Published 2008
    ..., Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to protect secret DATA packets from...
    Get full text
    Get full text
    Others
  11. 271
  12. 272
    by Hanson, Judith
    Published 2010
    ... eclectic 'Jam-mgon Kong-sprul (1813-99). The text contains instructions and commentary on the Four...
    Get full text
  13. 273
    by Adams, Mark M.
    Published 2017
    ... to prevent the attacker from decoding the message. This thesis examines the use of friendly jamming, in which...
    Get full text
  14. 274
    by Kaya, Yildirim
    Published 2012
    .... In the absence of interception, adversaries might attempt to jam the signal so that the network cannot operate...
    Get full text
    Others
  15. 275
    by Szu-Yung Wang, 王嗣詠
    Published 2015
    ... communications are widely used to solve the licensed spectrum shortage problem. However, jamming attacks is one...
    Get full text
    Others
  16. 276
    by Shu-Chen Lu, 呂書禎
    Published 2015
    ...碩士 === 國立中正大學 === 資訊工程研究所 === 104 === As the fast increase of vehicles, traffic jam becomes a...
    Get full text
    Others
  17. 277
  18. 278
    by Zhang, Bingwen
    Published 2013
    ... against jamming attacks. Existing research focuses on the optimal design of the hopping pattern, which...
    Get full text
    Get full text
    Others
  19. 279
    by Lin, Kenny, 1978-
    Published 2005
    ... is vulnerable to advanced repeat-back jamming techniques. Rapidly advancing technology producing inexpensive...
    Get full text
    Others
  20. 280
    by Tei-Pei Liu, 劉德培
    Published 2004
    ... can not reject high power narrowband interference completely. So we need an anti-jamming filter...
    Get full text
    Others