∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Abstract-SC-FDMA (Single-Carrier Frequency Division Multiple Access) is employed in tbe 3GPP LTE (Long-Term Evolution) standard as tbe uplink transmission scbeme. Tbe SC-FDMA signa...
In this paper we investigate the channel capacity of intensity modulated direct detection (IM/DD) wireless optical communication systems for an AWGN channel with a limit on the ave...
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...