Suggested Topics within your search.
Suggested Topics within your search.
LB2300 Higher Education
49
J Political Science
24
Technology: general issues
11
Geomorphology and geological surface processes
9
Slovenia
9
TK Electrical engineering. Electronics Nuclear engineering
9
L Education (General)
7
History of engineering and technology
5
Jamming
5
Social & cultural anthropology, ethnography
5
T Technology
5
TA Engineering (General). Civil engineering (General)
5
Traffic congestion
5
Anthropology
4
Article
4
RA Public aspects of medicine
4
Research and information: general
4
Sociology
4
controlled study
4
human
4
History of engineering & technology
3
Humans
3
Society & social sciences
3
article
3
male
3
nonhuman
3
Automation
2
BP Islam. Bahaism. Theosophy, etc
2
Behavioral research
2
Biology, life sciences
2
-
261
-
262
-
263
-
264by S. Fatemeh Zamanian, Mohammad Hossein Kahaei, S. Mohammad Razavizadeh, Tommy SvenssonSubjects: “...jamming...”
Published 2021-01-01
Get full text
Article -
265“... of frequency hopping systems incurred by jamming for military used. In addition to the jamming model , we...”
Get full text
Others -
266
-
267“... analysis.It is shown that the system combining with Reed-Solomon codes can enhance itsanti-jam...”
Get full text
Others -
268“... environment. The Jamming attacks are the representative energy-consumption DoS attacks in wireless sensor...”
Get full text
Others -
269“... the repeat jamming is presented. The construction and antijamming performance of this technique are described...”
Get full text
Get full text
-
270by Wu, Jingqi“..., Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to protect secret DATA packets from...”
Published 2008
Get full text
Get full text
Others -
271
-
272by Hanson, Judith“... eclectic 'Jam-mgon Kong-sprul (1813-99). The text contains instructions and commentary on the Four...”
Published 2010
Get full text
-
273by Adams, Mark M.“... to prevent the attacker from decoding the message. This thesis examines the use of friendly jamming, in which...”
Published 2017
Get full text
-
274by Kaya, Yildirim“.... In the absence of interception, adversaries might attempt to jam the signal so that the network cannot operate...”
Published 2012
Get full text
Others -
275“... communications are widely used to solve the licensed spectrum shortage problem. However, jamming attacks is one...”
Get full text
Others -
276“...碩士 === 國立中正大學 === 資訊工程研究所 === 104 === As the fast increase of vehicles, traffic jam becomes a...”
Get full text
Others -
277
-
278by Zhang, Bingwen“... against jamming attacks. Existing research focuses on the optimal design of the hopping pattern, which...”
Published 2013
Get full text
Get full text
Others -
279by Lin, Kenny, 1978-“... is vulnerable to advanced repeat-back jamming techniques. Rapidly advancing technology producing inexpensive...”
Published 2005
Get full text
Others -
280“... can not reject high power narrowband interference completely. So we need an anti-jamming filter...”
Get full text
Others