Proactive eavesdropping with jamming and eavesdropping mode selection

J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …

Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - dl.acm.org
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …

Proactive eavesdropping with jamming and eavesdropping mode selection

J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - pure.korea.ac.kr
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …

Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

J Moon, SH Lee, H Lee, I Lee - IEEE TRANSACTIONS ON …, 2019 - scholar.korea.ac.kr
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …