Academic literature on the topic 'Cooperative jamming'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cooperative jamming.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cooperative jamming"
Xu, Yifan, Guochun Ren, Jin Chen, Xiaobo Zhang, Luliang Jia, and Lijun Kong. "Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks." Applied Sciences 8, no. 10 (October 14, 2018): 1911. http://dx.doi.org/10.3390/app8101911.
Full textFan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.
Full textRajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (February 9, 2021): 1563. http://dx.doi.org/10.3390/app11041563.
Full textWu, Yuandong, and Yan Huo. "A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems." Wireless Communications and Mobile Computing 2021 (January 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6638405.
Full textShuangyu Luo, Jiangyuan Li, and A. P. Petropulu. "Uncoordinated Cooperative Jamming for Secret Communications." IEEE Transactions on Information Forensics and Security 8, no. 7 (July 2013): 1081–90. http://dx.doi.org/10.1109/tifs.2013.2261060.
Full textYe, Fang, Fei Che, and Lipeng Gao. "Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm." International Journal of Aerospace Engineering 2018 (December 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/7490895.
Full textBagali, Sheetal, and R. Sundaraguru. "Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3284. http://dx.doi.org/10.11591/ijece.v10i3.pp3284-3294.
Full textLee, Hoon, Subin Eom, Junhee Park, and Inkyu Lee. "UAV-Aided Secure Communications With Cooperative Jamming." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9385–92. http://dx.doi.org/10.1109/tvt.2018.2853723.
Full textLi, An, and Nong Qu. "Secure Performance of an Untrusted AF Relay System with a Friendly Wireless Powered Jammer." Mobile Information Systems 2019 (January 2, 2019): 1–8. http://dx.doi.org/10.1155/2019/6968730.
Full textStojanovski, Toni Draganov, and Ninoslav Marina. "Secure Wireless Communications via Cooperative Transmitting." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/760175.
Full textDissertations / Theses on the topic "Cooperative jamming"
Wu, Jingqi. "Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/885.
Full textPierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.
Full textLyamin, Nikita. "Performance evaluation of C-ACC/platooning under ITS-G5 communications." Licentiate thesis, Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32320.
Full textACDC
Lo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.
Full textTomek, Prokop. "Československá redakce Radio Free Europe: historie a vliv na československé dějiny." Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-326941.
Full textBook chapters on the topic "Cooperative jamming"
Commander, Clayton W., Panos M. Pardalos, Valeriy Ryabchenko, Sergey Sarykalin, Timofey Turko, and Stan Uryasev. "Robust Wireless Network Jamming Problems." In Optimization and Cooperative Control Strategies, 399–416. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-88063-9_23.
Full textHe, Xiang, and Aylin Yener. "Cooperative Jamming: The Tale of Friendly Interference for Secrecy." In Securing Wireless Communications at the Physical Layer, 65–88. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1385-2_4.
Full textXu, Zhifan, and Melike Baykal-Gürsoy. "A Cooperative Jamming Game in Wireless Networks Under Uncertainty." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 233–54. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63086-7_14.
Full textFan, Jingjing, Yan Huo, Qinghe Gao, and Tao Jing. "A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications." In Wireless Algorithms, Systems, and Applications, 97–108. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_9.
Full textFan, Xin, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian, and Jin Qian. "Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information." In Wireless Algorithms, Systems, and Applications, 483–95. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60033-8_42.
Full textHou, Yantian, and Ming Li. "Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming." In Wireless Algorithms, Systems, and Applications, 440–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39701-1_36.
Full textMa, Jing, Bin Shi, Fei Che, and Sitong Zhang. "Research on Evaluation Method of Cooperative Jamming Effect in Cognitive Confrontation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 40–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22971-9_4.
Full textSharma, Shashibhushan, Sanjay Dhar Roy, and Sumit Kundu. "Physical Layer Security in Cognitive Cooperative Radio Network with Energy Harvesting DF Relay Assisted with Cooperative Jamming." In Lecture Notes in Electrical Engineering, 119–29. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0829-5_12.
Full textLuo, Yijie, Yang Yang, Yanlei Duan, and Zhengju Yang. "Joint D2D Cooperative Relaying and Friendly Jamming Selection for Physical Layer Security." In Machine Learning and Intelligent Communications, 115–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_12.
Full textAl-Hashmy, Reham M., Mohamed AbdelRaheem, and Usama S. Mohmed. "Anti-jamming Cooperative Technique for Cognitive Radio Networks: A Stackelberg Game Approach." In Advances in Intelligent Systems and Computing, 750–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31129-2_68.
Full textConference papers on the topic "Cooperative jamming"
Stanojev, Igor, and Aylin Yener. "Cooperative jamming via spectrum leasing." In 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, 2011. http://dx.doi.org/10.1109/wiopt.2011.5930026.
Full textHan-Ting Chiang and James S. Lehnert. "Optimal cooperative jamming for security." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127474.
Full textWu, Keting, Dawei Wang, Ruonan Zhang, and Daosen Zhai. "Secure Cognitive Communication via Cooperative Jamming." In 2020 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc49849.2020.9238993.
Full textPierrot, Alexandre J., and Matthieu R. Bloch. "LDPC-based coded cooperative jamming codes." In 2012 IEEE Information Theory Workshop (ITW 2012). IEEE, 2012. http://dx.doi.org/10.1109/itw.2012.6404716.
Full textGu, Pengwenlong, Cunqing Hua, Rida Khatoun, Yue Wu, and Ahmed Serhrouchni. "Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8253978.
Full textWang, Jianqi, and A. Lee Swindlehurst. "Cooperative Jamming in MIMO ad-hoc networks." In 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers. IEEE, 2009. http://dx.doi.org/10.1109/acssc.2009.5469718.
Full textMabrouk, Asma, Kamel Tourki, and Noureddine Hamdi. "Relay selection for optimized cooperative jamming scheme." In 2015 23rd European Signal Processing Conference (EUSIPCO). IEEE, 2015. http://dx.doi.org/10.1109/eusipco.2015.7362350.
Full textLun Dong, Zhu Han, Athina P. Petropulu, and H. Vincent Poor. "Cooperative jamming for wireless physical layer security." In 2009 IEEE/SP 15th Workshop on Statistical Signal Processing (SSP). IEEE, 2009. http://dx.doi.org/10.1109/ssp.2009.5278549.
Full textMa, Baihe, Zhihong Liu, Yong Zeng, and Jianfeng Ma. "Cooperative Jamming for Secrecy of Wireless Communications." In 2018 International Conference on Networking and Network Applications (NaNA). IEEE, 2018. http://dx.doi.org/10.1109/nana.2018.8648704.
Full textLu, Weifeng, Zhihao Ren, Jia Xu, and Siguang Chen. "Cooperative Jamming Algorithm Based on Trust Update." In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00060.
Full textReports on the topic "Cooperative jamming"
Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.
Full textYunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.
Full textSarıkaya, Yunus, Özgür Erçetin, and Özgür Gürbüz. Dynamic control for cooperative jamming with a non-altruistic node. Sabancı University, April 2014. http://dx.doi.org/10.5900/su_fens_wp.2014.24089.
Full text