Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Wireless communications under hostile jamming: security and efficiency
Bookmark Share

Text

Wireless communications under hostile jamming: security and efficiency

Li, Tongtong - Personal Name; Song, Tianlong - Personal Name; Liang, Yuan - Personal Name;

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications.

Table of contents

Part I Wireless Technology and Communications—Explorations & Trends
Advancement in Wireless Technologies and Networks
Cognitive Radio Network Technologies and Applications
Emerging Trends in Vehicular Communication Networks
An Overview of 5G Technologies
Design and Application for Reliable Cooperative Networks
Semantics for Delay-Tolerant Network (DTN)

Part II Wireless Technology and Communications—Methodologies & Implementations
Architectural Building Protocols for Li-Fi (Light Fidelity)
Infrastructure in Mobile Opportunistic Networks
Generic Design and Advances in Wearable Sensor Technology
Realizing the Wireless Technology in Internet of Things (IoT)
Fast and Flexible Initial Uplink Synchronization for Long-Term Evolution

Part III Wireless Technology and Communications—Advancement & Future Scope
Toward a “Green” Generation of Wireless Communications Systems
Security Attacks on Wireless Networks and Their Detection Techniques
Spectrum Decision Mechanisms in Cognitive Radio Networks
Vehicular Networks to Intelligent Transportation Systems
State Estimation and Anomaly Detection in Wireless Sensor Networks
Experimental Wireless Network Deployment of Software-Defined and Virtualized Networking in 5G E


Availability
#
Rekayasa Keamanan Siber (Rak 000) 004.66 LI w
b0002536
Available
#
Rekayasa Keamanan Siber (Rak 000) 004.66 LI w/2
b0002578
Available
Detail Information
Series Title
--
Call Number
004.66 LI w
Publisher
Singapore : Springer., 2018
Collation
xxi, 219 hlm; 23,5 cm
Language
English
ISBN/ISSN
9789811308208
Classification
004.66
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Wireless communication systems -- Security measures
Radio resource management (Wireless communications)
Specific Detail Info
--
Statement of Responsibility
Tongtong Li, Tianglong Song, dan Yuan Liang
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?