Login / Signup
Emulated CP jamming and nulling attacks on SC-FDMA and two novel countermeasures.
Jasmin A. Mahal
Chowdhury Shahriar
T. Charles Clancy
Published in:
MILCOM (2015)
Keyphrases
</>
countermeasures
information security
constraint programming
java card
rural areas
security measures
cyber attacks
power analysis
information warfare