최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE systems journal, v.15 no.2, 2021년, pp.3093 - 3096
Son, Woong (Chungnam National University, Department of Electronics Engineering, Daejeon, South Korea) , Nam, Hyunwoo (School of Electrical Engineering Korea Advanced Institute of Science and Technology, Daejeon, South Korea) , Shin, Won-Yong (Yonsei University, Department of Computational Science and Engineering, Seoul, South Korea) , Jung, Bang Chul (Chungnam National University, Department of Electronics Engineering, Daejeon, South Korea)
We investigate the secrecy outage probability (SOP) of a downlink wiretap network consisting of a single legitimate base station (BS), multiple legitimate mobile stations (MSs), and multiple potential eavesdroppers (EVEs), where each EVE randomly attempts to overhear the ...
Kapetanovic, Dzevdan, Zheng, Gan, Rusek, Fredrik. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE communications magazine, vol.53, no.6, 21-27.
Chorti, A., Perlaza, S. M., Zhu Han, Poor, H. V.. On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.31, no.9, 1850-1863.
Bang, Inkyu, Jung, Bang Chul. Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers. IEEE access : practical research, open solutions, vol.7, 127078-127089.
Abbas, Mohammed Adil, Song, Hojin, Hong, Jun-Pyo. Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers. IEEE transactions on information forensics and security, vol.14, no.4, 969-980.
Farhat, Jamil, Brante, Glauber, Demo Souza, Richard. On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies. IEEE signal processing letters, vol.24, no.8, 1228-1232.
Ge, Xin, Jin, Hu, Zhu, Jun, Cheng, Julian, Leung, Victor C. M.. Exploiting Opportunistic Scheduling in Uplink Wiretap Networks. IEEE transactions on vehicular technology, vol.66, no.6, 4886-4897.
Wu, Yongpeng, Khisti, Ashish, Xiao, Chengshan, Caire, Giuseppe, Wong, Kai-Kit, Gao, Xiqi. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.36, no.4, 679-695.
Yi-Sheng Shiu, Shih Yu Chang, Hsiao-Chun Wu, Huang, Scott C.-H, Hsiao-Hwa Chen. Physical layer security in wireless networks: a tutorial. IEEE wireless communications, vol.18, no.2, 66-74.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.