Author of the publication

How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario.

, , , , , and . GLOBECOM Workshops, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario., , , , , and . GLOBECOM Workshops, page 1-7. IEEE, (2017)Hybrid Intrusion Detection System for DDoS Attacks., , and . J. Electr. Comput. Eng., (2016)Beamforming Aided Interference Management with Improved Secrecy for Correlated Channels., , , and . VTC Spring, page 1-5. IEEE, (2014)User behaviour modelling based DDoS attack detection., , and . SIU, page 2186-2189. IEEE, (2014)A Joint Optimization Scheme for Artificial Noise and Transmit Filter for Half and Full Duplex Wireless Cyber Physical Systems., , , and . IEEE Trans. Sustain. Comput., 3 (2): 126-136 (2018)Efficient PHY layer security in MIMO-OFDM: Spatiotemporal selective artificial noise., and . WOWMOM, page 1-6. IEEE Computer Society, (2013)Physical layer security in cognitive radio networks: A beamforming approach., and . BlackSeaCom, page 233-237. IEEE, (2013)Implementation and performance evaluation of dynamic spectrum access using software defined radios., , , and . BlackSeaCom, page 157-161. IEEE, (2013)Filter Optimization Aided Interference Management with Improved Secrecy., , , , and . VTC Fall, page 1-6. IEEE, (2014)Analysis on the effects of artificial noise on physical layer security., and . SIU, page 1-4. IEEE, (2013)