1 |
Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A Survey on Wireless Security : Technical Challenges, Recent Advances, and Future Trends", Proceedings of the IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
DOI
|
2 |
M. Lichtman, J. D. Poston, S. Amuru, C. Shahriar, T. C. Clancy, R. M. Buehrer and J. H. Reed, "A communications jamming taxonomy", IEEE Security & Privacy, vol. 14, no. 1, pp. 47-54, Jan. 2016.
DOI
|
3 |
S. Vardhan and A. Garg, "Information jamming in electronic warfare: operational requirements and techniques", Proceedings of International conference on Electronics Communication and Computational Engineering, pp. 49-54, Nov. 2014.
|
4 |
B. A. Bash, D. Goeckel, D. Towsley and S. Guha, "Hiding information in noise: Fundamental limits of covert wireless communication", IEEE Communication. Magazine, vol. 53, no. 12, pp. 26-31, Dec. 2015.
|
5 |
T. Roh, "Hop Acquisition Performances of the FH- CSS (Frequency Hopped-Chirp Spread Spectrum) Communication Systems", Master's degree in Engineering, Kyungpook National University, Korea, 2011.
|
6 |
D. J. Torriori, "Fundamental Limitations on Repeater Jamming of Frequency-Hopping Communications", IEEE Journal on Selected Areas in Communications, vol. 7, no. 5, pp. 569-575, May 1989.
DOI
|
7 |
C. Lee, J. Ryu, S. Jo and K. Lee, "Analysis on the Performance and Sensitivity of Follower Jamming Against Frequency Hopping Systems", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 1225-1228, Jul. 2006.
|
8 |
E. B. Felsted, "Follower Jammer Considerations for Frequency Hopped Spread Spectrum", IEEE MILCOM, vol. 2, pp. 474-478, Oct. 1998.
|