过去一年中添加的文章,按日期排序

Ergodic Secrecy Capacity Analysis for RIS-Aided Wireless Powered Communication System Under Different Phase Shifting

J Chen, K Cao, L Lv, H Ding, R Dong… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
4 天前 - … Abstract—This paper investigates the physical layer security (PLS) of reconfigurable
Physical layer security (PLS), from the perspective of information theory, enables secure

ChaQra: a cellular unit of the Indian quantum network

S Gupta, I Agarwal, V Mogiligidda… - Scientific Reports, 2024 - nature.com
5 天前 - … However, these are secure against the known quantum attacks whereas theoretical
security proofs of QKD protocols is independent of all future advances in computational …

[HTML][HTML] Structural barriers to maternity care in Cameroon: a qualitative study

AAH Harsono, CL Bond, C Enah, MG Ngong… - Reproductive …, 2024 - ncbi.nlm.nih.gov
7 天前 - … limitations of the healthcare system,(3) inadequate physical infrastructure. Civil
unrest impacted personal security, transportation safety, and disrupted medical transport system. …

ДОСЛІДЖЕННЯ СТІЙКОСТІ ДО АТАК ВІДТВОРЕННЯ ПРОТОКОЛІВ ДИСТАНЦІЙНОГО КЕРУВАННЯ З ВИКОРИСТАННЯМ РАДІОКАНАЛУ 433 МГЦ

O Mykhaylova, S Artem - Ukrainian Information Security Research Journal - jrnl.nau.edu.ua
8 天前 - This article identifies critical vulnerabilities in the EV1527 protocol that are widely
used in remote control systems, particularly home automation systems. Focusing on a detailed …

[HTML][HTML] Secure Performance Comparison for NOMA: Reconfigurable Intelligent Surface or Amplify-and-Forward Relay?

C Jiang, C Zhang, C Huang, J He, Z Zhang… - Journal of Information and …, 2024 - Elsevier
8 天前 - … This paper compares these two technologies at the physical layer security (PLS)
level for non-orthogonal multiple access (NOMA) with an internal near-end eavesdropper. …

Secure Formation Tracking of Networked MSVs Under Actuator Constraints and DoS Attacks: Data-Driven Observer-based Control

TF Ding, HY Zhang, MF Ge, W Cao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
10 天前 - … The second one is called the datadriven observer-based local controller in physical
layer, which is designed to realize the SFT of NMSVs constrained by the model uncertainties…

Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks

A Qasem, A Tahat - Simulation Modelling Practice and Theory, 2024 - Elsevier
10 天前 - … To the best of our knowledge, this is the first time that security on the 5G mm-wave
physical layer has been considered using this novel approach. Moreover, the utilized models …

Privacy Amplification in Quantum Key Distribution with Machine Learning

N Agarwal - channels, 2024 - techrxiv.org
10 天前 - … Despite offering informationtheoretical security, its physical implementations often
suffer from unintended information leakage, known as side channels, which eavesdroppers …

Security enhancement by intelligent reflecting surfaces for visible light communications

L Qian, L Zhao, N Huang, A Chaaban, Z Xu - Optics Communications, 2024 - Elsevier
15 天前 - … (IRS) are expected to enhance the physical layer security (PLS) by constructing
a … First, from the perspective of information theory, we derive the achievable secrecy rate …

Prevalence and Patterns of Sexual Assault in the Context of Socio-demographic Dynamics in Benue State of Nigeria

CA Muodumogu, PT Anule, CC Madu… - International Journal of …, 2024 - ijrss.org
21 天前 - … This study aimed to collect and construct data that provide information on the
many dimensions of sexual assault. The objectives include to examine the incidence of sexual …