Emulated CP jamming and nulling attacks on SC-FDMA and two novel countermeasures.

Jasmin A. MahalChowdhury ShahriarT. Charles Clancy
Published in: MILCOM (2015)
Keyphrases
  • countermeasures
  • information security
  • constraint programming
  • java card
  • rural areas
  • security measures
  • cyber attacks
  • power analysis
  • information warfare