Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks.
Ding XuHongbo ZhuQun LiPublished in: IEEE Access (2019)
Keyphrases
- communication networks
- wireless communication
- wireless channels
- distributed databases
- network structure
- wireless technologies
- network design
- communication infrastructure
- wireless networks
- network infrastructure
- anomaly detection
- computer networks
- base station
- smart grid
- communication technologies
- information dissemination
- ip networks
- network traffic
- smart card
- internet protocol
- email communication
- intrusion detection
- data analysis
- data mining
- multi hop
- object oriented
- mobile devices
- social networks
- communication protocols
- databases
- database