Suchergebnisse
Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- intelligent reflecting surface 6 Treffer
- wireless communication 6 Treffer
- optimization 5 Treffer
- security 5 Treffer
- array signal processing 4 Treffer
-
45 weitere Werte:
- eavesdropping 4 Treffer
- precoding 4 Treffer
- communication system security 3 Treffer
- intelligent reflecting surfaces 3 Treffer
- interference 3 Treffer
- downlink 2 Treffer
- massive mimo 2 Treffer
- miso communication 2 Treffer
- physical layer security 2 Treffer
- radio frequency 2 Treffer
- receivers 2 Treffer
- signal to noise ratio 2 Treffer
- alternating optimization 1 Treffer
- autonomous aerial vehicles 1 Treffer
- awgn channels 1 Treffer
- binary phase shift keying 1 Treffer
- buffer-aided relay selection 1 Treffer
- channel estimation 1 Treffer
- closed-form solutions 1 Treffer
- computer security 1 Treffer
- cooperative systems 1 Treffer
- covert communication 1 Treffer
- data structures 1 Treffer
- deep neural network 1 Treffer
- delays 1 Treffer
- detectors 1 Treffer
- development 1 Treffer
- distributionally robust optimization 1 Treffer
- electronic voting 1 Treffer
- electronic voting systems 1 Treffer
- formal specification and verification 1 Treffer
- formal verification 1 Treffer
- fractional programming 1 Treffer
- full duplex 1 Treffer
- hybrid precoding 1 Treffer
- information security 1 Treffer
- instruments 1 Treffer
- intelligent reflecting surface (irs) 1 Treffer
- intrusion detection 1 Treffer
- jamming 1 Treffer
- kernel 1 Treffer
- law 1 Treffer
- legal factors 1 Treffer
- linux 1 Treffer
- mimo 1 Treffer
Inhaltsanbieter
12 Treffer
-
In: IEEE Transactions on Information Forensics and Security, Jg. 19 (2024), S. 2664-2679Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 19 (2024), S. 1086-1098Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 18 (2023), S. 4463-4474Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 17 (2022), S. 1300-1315Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 4101-4112Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 19 (2024), S. 4945-4956Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 4363-4376Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 17 (2022), S. 253-264Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 1655-1669Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 5429-5441Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 18 (2023), S. 2899-2912Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 4 (2009-12-01), Heft 4, S. 651-661Online academicJournalZugriff: