Loading…
Loading…
Loading…
Guest Editorial: Security Architecture and Technologies for 5G
Published in IET networks
(01.03.2018)
Get full text
Journal Article
Loading…
On physical-layer security for primary system in underlay cognitive radio networks
Xie, Ping, Zhang, Moli, Zhang, Gaoyuan, Zheng, Ruijuan, Xing, Ling, Wu, Qingtao
Published in IET networks (01.03.2018)
Published in IET networks (01.03.2018)
Get full text
Journal Article
Loading…
Performance evaluation of secure multipath retransmission mechanism in next generation heterogeneous communication systems
Zeng, Jiaxin, Cao, Yuanlong, Ke, Fenfen, Huang, Minghe, Zhang, Guanghe, Lu, Wei
Published in IET networks (01.03.2018)
Published in IET networks (01.03.2018)
Get full text
Journal Article
Loading…
Method for detecting abnormal behaviour of users based on selective clustering ensemble
Du, Juan, Xie, Ping, Zhu, Junlong, Zheng, Ruijuan, Wu, Qingtao, Zhang, Mingchuan
Published in IET networks (01.03.2018)
Published in IET networks (01.03.2018)
Get full text
Journal Article