Добірка наукової літератури з теми "Radio jamming"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Radio jamming".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Radio jamming":

1

Fast, Walter. "Molecular Radio Jamming." Chemistry & Biology 10, no. 1 (January 2003): 1–2. http://dx.doi.org/10.1016/s1074-5521(03)00005-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Riza, Bob Subhan. "An Energy-Efficient Jamming Attacks Detection based on Cognitive Radio Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): CS—37—CS—45. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
5G wireless networks, primarily because of the device - to - device connections can enable huge networking. Dynamic bandwidth connectivity is a feature that enables device-to-device connections. Applications configured with cognitive radios must be authorized to reprocess the bandwidth consumed by cellular connections. The complex efficiency of the bandwidth allows cognitive consumers to switch between networks. In specific, switching contributes to energy efficiency, delay, and bandwidth connectivity. When the system is under the jamming attack, the computational cost much more. It is a major problem to fix jamming while ensuring an optimal level of operation. Thus, existing anti-jamming methods consider static users, this suggests preventive measures for wireless cognitive radio users in this paper and test them. The multivariate cumulative total was used in this study to classify suspicious activity like jamming attacks in Cognitive Radio Networks (CRN). Preventive-measures are being taken to resolve security risks to cognitive radio networks. The Intrusion Detection System (IDS) has been presented, including a way of preventing attacks on the cognitive radio network infrastructure.
3

McKinney, Tiffany. "Radio Jamming: The Disarmament of Radio Propaganda." Small Wars & Insurgencies 13, no. 3 (December 2002): 111–44. http://dx.doi.org/10.1080/09592310208559200.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sârbu, Annamaria, and Dumitru Neagoie. "Wi-Fi Jamming Using Software Defined Radio." International conference KNOWLEDGE-BASED ORGANIZATION 26, no. 3 (June 1, 2020): 162–66. http://dx.doi.org/10.2478/kbo-2020-0132.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractIn this article we present software defined radio (SDR) instrumentation used for interfering or jamming Wi-Fi networks. A Wi-Fi network analyzer application was used together with a low cost, commercially available SDR, Hack RF one, to conduct aimed interference on a 802.11 b/g/n network. A GNU radio flowchart was used to control the radio transceiver (SDR) by emitting a jamming signal aimed towards the targeted client by means of a directional antenna. Various signal bandwidths and distance from the targeted device were tested to characterize the adequate parameters of an effective jamming signal with respect to the calculated signal to noise ratio (SNR). Jamming efficiency was evaluated by means of a Wi-Fi connectivity speed test application installed on the targeted device, in order to measure connectivity degradation if complete jamming was not possible. Results presented suggest that Wi-Fi jamming is possible by means of SDR technology, providing insights on the methodology used and initial optimisation procedures in the test environment.
5

Ksendzuk, A. V. "UNMANNED AERIAL VEHICLE DETECTION AND JAMMING RADIO COMPLEX." Issues of radio electronics, no. 3 (March 20, 2018): 19–24. http://dx.doi.org/10.21778/2218-5453-2018-3-19-24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Modern threats for anti-missile system and space surveillance and tracking system objects include terroristic and unidentifiable unmanned aerial vehicle. To counter these threats a concept of radar complex for unmanned aerial vehicles jamming and detection proposed. Complex consists of non-radiating radio locator, radio warfare station and global navigation jamming radar. Structure, principle of operation and basic technical characteristics of these systems described. Counter-drone actions algorithm in proposed complex described and analyzed. Results of mom-radiating radar development in JSC MAK Vimpel and its experimental investigation described. Precision of estimation range, velocity and angular location described. Jamming effectiveness estimator schematic diagram proposed. Jamming effectiveness may be estimated on navigation equipment or program models of prospective GPS receivers. Results of effective jamming signal development presented. Results may be used in small low-energy counter drone radioelectronic systems development for anti-missile and Space Surveillance and Tracking system objects.
6

Park, Kwi Woo, Min Joon Lee, and Chansik Park. "A Design of Anti-jamming Method Based on Spectrum Sensing and GNSS Software Defined Radio." E3S Web of Conferences 94 (2019): 03004. http://dx.doi.org/10.1051/e3sconf/20199403004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents result of new approach for anti-jamming using a method based on cognitive radio. To detect and get center frequency and bandwidth of jamming, a spectrum sensing based on multi-channel energy detector is implemented on the SDR. The SDR and a universal software radio peripheral is used to support real-time channel reconfiguration. And detected center frequency and bandwidth is used to select LO frequency to avoid jamming and receive GNSS signal. Then the receiver is reconfigured by the selected LO frequency. To verify the feasibility of the proposed anti-jamming process, position, carrier to noise ratio of each channel are measured using a test scenario that is consist of GPS and Beidou with a CW jamming. As a results, by switching of LO frequency, GNSS signal that is not affected by jamming can be received with the same performance as non-jamming.
7

Zhu, Yanmin, and Yuan Jiang. "On Optimal Antijamming Strategies in Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 793194. http://dx.doi.org/10.1155/2012/793194.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a noncooperative nonzero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of wireless channel access and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying the Pareto dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by the Pareto dominance and risk dominance achieve the expected performance. Our results presented in the paper provide valuable defense guidance for wireless sensor networks against jamming attacks.
8

Shaikh, Sarmad Ahmed, Muhammad Minhaj Arshad, Hammad Mehmood Cheema, Muhammad Zainul Abideen, and Syed Masaab Ahmed. "An Educational Training Kit for an Efficient GPS Anti-Jamming System." International Journal of Emerging Technologies in Learning (iJET) 16, no. 06 (March 30, 2021): 231. http://dx.doi.org/10.3991/ijet.v16i06.21251.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Global positioning system (GPS) is one of the key satellite-based radio technolo-gy providing navigational services on earth or near earth. The increasing usage of GPS applications in daily life has proved that students/researchers of many edu-cational departments including information and communication technology (ICT) are particularly interested to learn and visualize the GPS anti-jamming techniques in a simpler way in their major communication courses. It is a fact that GPS radio signal is vulnerable in various ways to jamming signals launched by malicious el-ements. The traditional available GPS anti-jamming techniques generally involve either added hardware and/or computational complexity which introduce difficul-ty for students to understand the basic concepts. As an alternative, this paper pre-sents a simpler GPS anti-jamming system kit based on L1-band (1.575 GHz) of GPS for education purpose. More specifically, the proposed antenna array, inte-grated with two couplers, cancels out the jamming signal in radio frequency (RF) domain using sum and difference patterns generated by the latter. The simulated and measured results, in terms of scattering parameters and power profiles, of the proposed system have shown that the jamming signal can be eliminated with less complexity. Eventually, the proposed GPS anti-jamming system has great poten-tial to be used in ICT related disciplines for learning and training purposes.
9

Di Pietro, R., and G. Oligeri. "Jamming mitigation in cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 10–15. http://dx.doi.org/10.1109/mnet.2013.6523802.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ibrahim, Khalid, Soon Xin Ng, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, and Sami Muhaidat. "Anti-Jamming Game to Combat Intelligent Jamming for Cognitive Radio Networks." IEEE Access 9 (2021): 137941–56. http://dx.doi.org/10.1109/access.2021.3117563.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Radio jamming":

1

Samadi, Nima, and Mihail Lupan. "Radio Jamming Detection and Forensics Analysis of Inter-Vehicular Communication Traces." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40565.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Rozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The usage of drones is steadily increasing as drones are becoming more available and useful to the general public, but drone usage also leads to problems as for example airports have had to shutdown due to drone sightings. It has become clear that a counter-drone system must be in place to neutralize intruding drones. However, neutralizing a drone is not an easy task, the risk of causing collateral damage and interfering with other radio systems must be highly considered when designing a counter-drone system. In this thesis a set of consumer drones was selected based on market popularity. By studying the wireless communication links of the selected drones a set of drone neutralization methods was identified. For each neutralization method a set of jamming and spoofing techniques was selected from current research. The techniques was used in practise by subjecting the drones to the techniques in a series of drone behaviour experiments. The results was used to evaluate the techniques in four criteria based on avoiding collateral damage, mitigating radio interference, identification requirement and handling multiple intruding drones. The evaluation was then summarized to discuss suitable drone neutralization methods and jamming & spoofing techniques. The results showed that there are neutralization methods that could potentially avoid causing col- lateral damage for certain drones. A full-band barrage jamming technique was shown to best the best performing based on the evaluation criteria, but was also the technique that theoretically induced the most radio interference. Furthermore, drones operating in way-point mode can only be neutralized using a GNSS jamming or spoofing neutralization method. Also using a GPS spoofing neutralization method was shown to be difficult to implement in practise.
Populariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
3

Price, Alfred W. "The evolution of electronic warfare equipment and techniques in the USA, 1901 to 1945." Thesis, Loughborough University, 1985. https://dspace.lboro.ac.uk/2134/7410.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This work describes the evolution cf electronic warfare equipment and techniques in the USA, from the first instance of radio jamming in that country in 1901 until the end of World War II in 1945. It begins with a review of early work on telegraph, radio and radar systems throughout the world, and countermeasures used during trials or in combat prior to World War II. Immediately after the USA ertered the conflict in 1941, the Radio Research Laboratory was set up near Boston to develop radio countermeasures equipment for the US armed forces. The organisation rapidly outgrew the capacity of a angle laboratory and in October 1942 Division 15 of the National Defense Research Committee was formed, to co-ordinate US work on countermeasures. The activities of RRL and Division 15 are described in detail, using cortemporary records and accounts from participants. Radar jammers developed by Divison 15 were first used in action in July 1943 during the invason of Sicily, and went on to play important roles in support amphibious landings and strategic bombing operations in the European and Pacific theatres of operations. The jamming devices and tactics employed, the enemy attempts to develop counter-countermeasures and the US moves to counter these counters are all described in detail. Conclusions are drawn on the effectiveness of the various types of jamming, based on post-war interrogation of German and Japanese serving officers and technical personnel. Appendices give technical details of the countermeasures devices produced in the USA during World War II, and the development of radar and radar countermeasures in Germany and Japan.
4

Collins, Travis Fredrick. "Implementation and Analysis of Spectral Subtraction and Signal Separation in Deterministic Wide-Band Anti-Jamming Scenarios." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/297.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the increasing volume of wireless traffic that military operations require, the likelihood of transmissions interfering with each other is steadily growing to the point that new techniques need to be employed. Furthermore, to combat remotely operated improvised explosive devices, many ground convoys transmit high-power broadband jamming signals, which block both hostile as well as friendly communications. These wide-band jamming fields pose a serious technical challenge to existing anti-jamming solutions that are currently employed by the Navy and Marine Corps. This thesis examines the feasibility of removing such deterministic jammers from the spectral environment, enabling friendly communications. Anti-jamming solutions in self-jamming environments are rarely considered in the literature, principally due to the non-traditional nature of such jamming techniques. As a result, a combination of approaches are examined which include: Antenna Subset Selection, Spectral Subtraction, and Source Separation. These are combined to reduce environmental interference for reliable transmissions. Specific operational conditions are considered and evaluated, primarily to define the limitations and utility of such a system. A final prototype was constructed using a collection of USRP software defined radios, providing solid conclusions of the overall system performance.
5

Kaya, Yildirim. "Simulation of wireless propagation and jamming in a high-rise building." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FKaya.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Arcangeloni, Luca. "Causal Inference for Jamming Detection in Adverse Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The goal of this thesis is the development of an anti-jamming defense mechanism based on causal inference. The current state-of-the-art methods to compute causality, i.e., Granger Causality (GC), Transfer Entropy (TE) and Convergent Cross Mapping (CCM) are presented and they are used to detect the smart jammer into an appropriate simulation environment. The performances of the causality tools are evaluated, pointing out how the TE obtains the best results while the GC fails the detection of the intruder. The innovative CCM algorithm, instead, requires to function a deterministic structure of the communications. In the first part of the work, before that simulation environment is impemented, the three methods are compared to underline their theoretical advantages and disadvantages.
7

M, M. Galib Asadullah. "Robust wireless communications under co-channel interference and jamming." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22571.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Gordon L. Stuber; Committee Member: Alfred D. Andrew; Committee Member: John A. Buck; Committee Member: Steven W. McLaughlin; Committee Member: Ye (Geoffrey) Li.
8

Kirkpantur-cadallli, Atiye Asli. "An Investigation Of Jamming Techniques Through A Radar Receiver Simulation." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609079/index.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this study, various jamming techniques and their effects on detection and tracking performance have been investigated through a radar receiver simulation that models a search radar for target acquisition and single-target tracking radar during track operation. The radar is modeled as looking at airborne targets, and hence clutter is not considered. Customized algorithms have been developed for the detection of target azimuth angle, range and Doppler velocity within the modeled geometry and chosen radar parameters. The effects of varying parameters like jamming-to-signal ratio (JSR) and jamming signal`s Doppler shift have been examined in the analysis of jamming effectiveness.
9

Dizdar, Onur. "Blind Channel Estimation Based On The Lloyd-max Algorithm Innarrowband Fading Channels And Jamming." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613333/index.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In wireless communications, knowledge of the channel coefficients is required for coherent demodulation. In this thesis, a blind channel estimation method based on the Lloyd-Max algorithm is proposed for single-tap fading channels. The algorithm estimates the constellation points for the received signal using an iterative least squares approach. The algorithm is investigated for fast-frequency hopping systems with small block lengths and operating under partial-band and partial-time jamming for both detecting the jammer and estimating the channel. The performance of the Lloyd-Max channel estimation algorithm is compared to the performance of pilot-based channel estimation algorithms which also use the least squares approach and non-coherent demodulation and decoding.
10

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks.
Ph. D.

Книги з теми "Radio jamming":

1

Pleikys, Rimantas. Jamming. Vilnius: R. Pleikys, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Levitt, Barry K. FH/MFSK performance in multitone jamming. Pasadena, Calif: National Aeronautics and Space Administration, Jet Propulsion Laboratory, California Institute of Technology, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Myers, Lawrence W. Improvised radio jamming techniques: Electronic guerrilla warfare. Boulder, Colo: Paladin Press, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Xiao, Liang. Anti-Jamming Transmissions in Cognitive Radio Networks. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24292-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rockburn, Ken. Medium rare: Jamming with culture. Toronto, Canada: Stoddart, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Poisel, Richard. Modern communications jamming principles and techniques. Boston, MA: Artech House, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Poisel, Richard. Modern communications jamming principles and techniques. Boston, MA: Artech House, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Poisel, Richard. Modern communications jamming: Principles and techniques. 2nd ed. Boston: Artech House, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Yao, Fuqiang. Tong xin kang gan rao gong cheng yu shi jian: Communication Anti-jamming Engineering and Practice. 8th ed. Beijing Shi: Dian zi gong ye chu ban she, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yao, Fuqiang. Tong xin kang gan rao gong cheng yu shi jian =: Communication anti-jamming engineering and practice. 8th ed. Beijing Shi: Dian zi gong ye chu ban she, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Radio jamming":

1

Chen, Yingying, Wenyuan Xu, Wade Trappe, and Yanyong Zhang. "Jamming Attacks and Radio Interference." In Securing Emerging Wireless Systems, 1–13. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-88491-2_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Toma, Andrea, Carlo Regazzoni, Lucio Marcenaro, and Yue Gao. "Learning Dynamic Jamming Models in Cognitive Radios." In Handbook of Cognitive Radio, 1–37. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-1389-8_64-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Toma, Andrea, Carlo Regazzoni, Lucio Marcenaro, and Yue Gao. "Learning Dynamic Jamming Models in Cognitive Radios." In Handbook of Cognitive Radio, 1987–2023. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-1394-2_64.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chen, Yingying, Wenyuan Xu, Wade Trappe, and Yanyong Zhang. "Detecting Jamming Attacks and Radio Interference." In Securing Emerging Wireless Systems, 1–18. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-88491-2_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hu, Qiao, and Gerhard Hancke. "Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks." In Radio Frequency Identification and IoT Security, 188–203. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sodagari, Shabnam, and T. Charles Clancy. "An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks." In Lecture Notes in Computer Science, 34–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25280-8_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hou, Yantian, and Ming Li. "Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming." In Wireless Algorithms, Systems, and Applications, 440–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39701-1_36.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gao, Yang, Zhaoquan Gu, Qiang-Sheng Hua, and Hai Jin. "Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks." In Lecture Notes in Computer Science, 759–70. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21398-9_59.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Al-Hashmy, Reham M., Mohamed AbdelRaheem, and Usama S. Mohmed. "Anti-jamming Cooperative Technique for Cognitive Radio Networks: A Stackelberg Game Approach." In Advances in Intelligent Systems and Computing, 750–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31129-2_68.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Won, Chulho, Jong-Hoon Youn, and Hesham Ali. "Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks." In Emerging Directions in Embedded and Ubiquitous Computing, 244–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11807964_25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Radio jamming":

1

Sharma, Satish Kumar. "Design and development of some novel phased arrays and anti-jamming antennas." In 2017 IEEE Radio and Antenna Days of the Indian Ocean (RADIO). IEEE, 2017. http://dx.doi.org/10.23919/radio.2017.8242260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Qi, Yang, and Ben Wu. "Radio Frequency Spectrum Control Based on Wideband Jamming and Photonic Jamming Cancellation." In Frontiers in Optics. Washington, D.C.: OSA, 2019. http://dx.doi.org/10.1364/fio.2019.jw3a.65.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Li, Husheng, and Zhu Han. "Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5425707.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bykov, S. V., N. A. Tarasova, and O. V. Ten. "Radio jamming development for stoppage standard CDMA." In 2008 9th International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering (APEIE). IEEE, 2008. http://dx.doi.org/10.1109/apeie.2008.4897125.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wang, Yujiao, Donglin Su, and Wenqing Chen. "Radio noise jamming analysis on communications system." In 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE). IEEE, 2009. http://dx.doi.org/10.1109/mape.2009.5355765.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Heng Zheng, Hongli Zhao, and Fei Li. "Accidental radio jamming suppression in passive radar." In 2008 IEEE Radar Conference (RADAR). IEEE, 2008. http://dx.doi.org/10.1109/radar.2008.4721054.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Khattab, Sherif, Daniel Mosse, and Rami Melhem. "Jamming Mitigation in Multi-Radio Wireless Networks." In the 4th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460912.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Xiaohua Li and Wednel Cadeau. "Anti-jamming performance of cognitive radio networks." In 2011 45th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2011. http://dx.doi.org/10.1109/ciss.2011.5766199.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chaczko, Zenon, Shaher Slehar, and Tamer Shnoudi. "Game-Theory Based Cognitive Radio Policies for Jamming and Anti-Jamming in the IoT." In 2018 12th International Symposium on Medical Information and Communication Technology (ISMICT). IEEE, 2018. http://dx.doi.org/10.1109/ismict.2018.8573725.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Peng, Qihang, Pamela C. Cosman, and Laurence B. Milstein. "Tradeoff between spoofing and jamming a cognitive radio." In 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers. IEEE, 2009. http://dx.doi.org/10.1109/acssc.2009.5470184.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Radio jamming":

1

Polydoros, Andreas. Packet Radio Networks under Dynamic Jamming. Fort Belvoir, VA: Defense Technical Information Center, December 1989. http://dx.doi.org/10.21236/ada217094.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії