Login / Signup
Covert and Secure Communications in NOMA Networks With Internal Eavesdropping.
Qiang Li
Dongyang Xu
Keivan Navaie
Zhiguo Ding
Published in:
IEEE Wirel. Commun. Lett. (2023)
Keyphrases
</>
network analysis
social networks
terrorist networks
key players
database
group communication
information flow
network topologies
data sets
neural network
social network analysis
network structure
complex networks
security requirements
key management
security level