Communications

Normal
0

21

false
false
false

PT-BR
X-NONE
X-NONE

Categories:
80 Views

Analysis Data - Sample

Categories:
179 Views

The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

Categories:
794 Views

This dataset is generated by GNU Radio.

Categories:
344 Views

By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used.

Categories:
347 Views

GENERATION OF MODE SELECTION PROBABILITY - SINGLE RATE CASE, IMPORTANCE OF DIRECT PATH, COMPARISON WITH CONVENTIONAL INCREMENTAL SCHEME

Categories:
126 Views

Bitcoin is a decentralized digital currency that has gained significant attention and growth in recent years. Unlike traditional currencies, Bitcoin does not rely on a centralized authority to control the supply, distribution, and verification of the validity of transactions. Instead, Bitcoin relies on a peer-to- peer network of volunteers to distribute pending transactions and confirmed blocks, verify transactions, and to collectively implement a replicated ledger that everyone agrees on. This peer-to-peer (P2P) network is at the heart of Bitcoin and many other blockchain technologies.

Categories:
716 Views

The Monte Carlo method (MCM) is known as the gold standard technique for uncertainty quantification (UQ). However, it requires a considerable number of simulations leading to excessive computational resources.

Categories:
145 Views

Data and codes for journal paper "MmWave Vehicular Beam Training with Situational Awareness Using Machine Learning" submitted to IEEE Access.

The code assumes Python 3.

Categories:
686 Views

1. Figure S1 shows the plasma frequency profile of the two-layer analytical model of the ionosphere, see Eq. (9) of the main text.

Categories:
208 Views

Pages