Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Jamming Attack). Showing records 1 – 12 of 12 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Oregon State University

1. Adem, Nadia. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.

Degree: PhD, Electrical and Computer Engineering, 2016, Oregon State University

 Cognitive radio technology emerges as a promising solution for overcoming shortage and inefficient use of spectrum resources. In cognitive radio networks, secondary users, which are… (more)

Subjects/Keywords: Jamming Attack Resiliency; Cognitive radio networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adem, N. (2016). Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/59838

Chicago Manual of Style (16th Edition):

Adem, Nadia. “Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.” 2016. Doctoral Dissertation, Oregon State University. Accessed December 15, 2019. http://hdl.handle.net/1957/59838.

MLA Handbook (7th Edition):

Adem, Nadia. “Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.” 2016. Web. 15 Dec 2019.

Vancouver:

Adem N. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. [Internet] [Doctoral dissertation]. Oregon State University; 2016. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/1957/59838.

Council of Science Editors:

Adem N. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. [Doctoral Dissertation]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/59838


Virginia Tech

2. Shahriar, Chowdhury MR. Resilient Waveform Design for OFDM-MIMO Communication Systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto'… (more)

Subjects/Keywords: Physical-Layer Security; Communications Security; OFDM; MIMO; Jamming; Antijam; Equalization Attack; Pilot Attack; LTE; WiMAX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, C. M. (2015). Resilient Waveform Design for OFDM-MIMO Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/56973

Chicago Manual of Style (16th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Doctoral Dissertation, Virginia Tech. Accessed December 15, 2019. http://hdl.handle.net/10919/56973.

MLA Handbook (7th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Web. 15 Dec 2019.

Vancouver:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10919/56973.

Council of Science Editors:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/56973

3. Saif, SAEED. Analysis of Jamming Attacks on Wireless Sensor Networks .

Degree: 2016, University of Hertfordshire

 Wireless Sensor Network (WSN) is a wireless-oriented form of communication largely used for outdoor applications, such as environmental monitoring and military surveillance. Therefore, a jamming(more)

Subjects/Keywords: jamming attack; wireless sensor networks; 802.15.4; WSN; PDR; PSR; Xbee; jammer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saif, S. (2016). Analysis of Jamming Attacks on Wireless Sensor Networks . (Thesis). University of Hertfordshire. Retrieved from http://hdl.handle.net/2299/17093

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Saif, SAEED. “Analysis of Jamming Attacks on Wireless Sensor Networks .” 2016. Thesis, University of Hertfordshire. Accessed December 15, 2019. http://hdl.handle.net/2299/17093.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Saif, SAEED. “Analysis of Jamming Attacks on Wireless Sensor Networks .” 2016. Web. 15 Dec 2019.

Vancouver:

Saif S. Analysis of Jamming Attacks on Wireless Sensor Networks . [Internet] [Thesis]. University of Hertfordshire; 2016. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/2299/17093.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Saif S. Analysis of Jamming Attacks on Wireless Sensor Networks . [Thesis]. University of Hertfordshire; 2016. Available from: http://hdl.handle.net/2299/17093

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

4. Nadendla, Venkata Sriram Siddhardh. On the Design and Analysis of Secure Inference Networks.

Degree: PhD, Electrical Engineering and Computer Science, 2016, Syracuse University

  Parallel-topology inference networks consist of spatially-distributed sensing agents that collect and transmit observations to a central node called the fusion center (FC), so that… (more)

Subjects/Keywords: Byzantine Attack; Eavesdropping; Inference Networks; Jamming; Security; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nadendla, V. S. S. (2016). On the Design and Analysis of Secure Inference Networks. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/590

Chicago Manual of Style (16th Edition):

Nadendla, Venkata Sriram Siddhardh. “On the Design and Analysis of Secure Inference Networks.” 2016. Doctoral Dissertation, Syracuse University. Accessed December 15, 2019. https://surface.syr.edu/etd/590.

MLA Handbook (7th Edition):

Nadendla, Venkata Sriram Siddhardh. “On the Design and Analysis of Secure Inference Networks.” 2016. Web. 15 Dec 2019.

Vancouver:

Nadendla VSS. On the Design and Analysis of Secure Inference Networks. [Internet] [Doctoral dissertation]. Syracuse University; 2016. [cited 2019 Dec 15]. Available from: https://surface.syr.edu/etd/590.

Council of Science Editors:

Nadendla VSS. On the Design and Analysis of Secure Inference Networks. [Doctoral Dissertation]. Syracuse University; 2016. Available from: https://surface.syr.edu/etd/590


Virginia Tech

5. Yan, Qiben. Security Enhanced Communications in Cognitive Networks.

Degree: PhD, Computer Science, 2014, Virginia Tech

 With the advent of ubiquitous computing and Internet of Things (IoT), potentially billions of devices will create a broad range of data services and applications,… (more)

Subjects/Keywords: cognitive network security; cognitive radio network; reactive jamming attack; network monitoring; botnet detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, Q. (2014). Security Enhanced Communications in Cognitive Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49704

Chicago Manual of Style (16th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Doctoral Dissertation, Virginia Tech. Accessed December 15, 2019. http://hdl.handle.net/10919/49704.

MLA Handbook (7th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Web. 15 Dec 2019.

Vancouver:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10919/49704.

Council of Science Editors:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49704


East Carolina University

6. Fu, Tian. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.

Degree: 2012, East Carolina University

 Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of… (more)

Subjects/Keywords: Information technology; Information science; Ad-hoc routing protocol; Jammer; Jamming attack; OPNET; Simulation; Wireless LANs; Denial of service attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, T. (2012). MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3888

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Thesis, East Carolina University. Accessed December 15, 2019. http://hdl.handle.net/10342/3888.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fu, Tian. “MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN.” 2012. Web. 15 Dec 2019.

Vancouver:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Internet] [Thesis]. East Carolina University; 2012. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10342/3888.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fu T. MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3888

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Nguyen-Minh, Huong. Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc.

Degree: Docteur es, Informatique, 2016, Avignon

 Le développement du transport partout dans le monde a fourni un grand nombre d'avantages pour de nombreux aspects de la vie humaine. Les systèmes de… (more)

Subjects/Keywords: Réseau de véhicule; Couche MAC; ITS; Attaque de brouillage; IEEE 802.11p; Jamming attack; Vehicular network; ITS; MAC; IEEE 802.11p; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen-Minh, H. (2016). Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc. (Doctoral Dissertation). Avignon. Retrieved from http://www.theses.fr/2016AVIG0212

Chicago Manual of Style (16th Edition):

Nguyen-Minh, Huong. “Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc.” 2016. Doctoral Dissertation, Avignon. Accessed December 15, 2019. http://www.theses.fr/2016AVIG0212.

MLA Handbook (7th Edition):

Nguyen-Minh, Huong. “Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc.” 2016. Web. 15 Dec 2019.

Vancouver:

Nguyen-Minh H. Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc. [Internet] [Doctoral dissertation]. Avignon; 2016. [cited 2019 Dec 15]. Available from: http://www.theses.fr/2016AVIG0212.

Council of Science Editors:

Nguyen-Minh H. Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks : Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc. [Doctoral Dissertation]. Avignon; 2016. Available from: http://www.theses.fr/2016AVIG0212


The Ohio State University

8. Abdelaziz, Amr Mohamed. Information Theoretical Studies on MIMO Channel with Limited Channel State Information.

Degree: PhD, Electrical and Computer Engineering, 2017, The Ohio State University

 Tremendous increase in throughput, reliability and security requirements in present and future wireless communication networks necessitates the migration towards the underutilized higher frequency bands. The… (more)

Subjects/Keywords: Communication; Electrical Engineering; Information Science; Information Theory; Secrecy Capacity; Transmitter Optimization; Limited CSI; Delay Limited Secrecy Capacity; Ergodic Secrecy Capacity; Covert MIMO Communication; Physical Layer Authentication; Jamming Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdelaziz, A. M. (2017). Information Theoretical Studies on MIMO Channel with Limited Channel State Information. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914

Chicago Manual of Style (16th Edition):

Abdelaziz, Amr Mohamed. “Information Theoretical Studies on MIMO Channel with Limited Channel State Information.” 2017. Doctoral Dissertation, The Ohio State University. Accessed December 15, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914.

MLA Handbook (7th Edition):

Abdelaziz, Amr Mohamed. “Information Theoretical Studies on MIMO Channel with Limited Channel State Information.” 2017. Web. 15 Dec 2019.

Vancouver:

Abdelaziz AM. Information Theoretical Studies on MIMO Channel with Limited Channel State Information. [Internet] [Doctoral dissertation]. The Ohio State University; 2017. [cited 2019 Dec 15]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914.

Council of Science Editors:

Abdelaziz AM. Information Theoretical Studies on MIMO Channel with Limited Channel State Information. [Doctoral Dissertation]. The Ohio State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914


Texas State University – San Marcos

9. Guirguis, Emad. On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications.

Degree: MS, Computer Science, 2012, Texas State University – San Marcos

 A Cyber-Physical System (CPS) is a one that features coordination between computational and physical components. CPSs are used in a diverse number of areas such… (more)

Subjects/Keywords: Jamming Attacks; Cyber Physical Systems; CPS; Target Tracking Applications; Computer Science; Mobile CPS; Attack Paradox; Smart Policies; Improved Policy; Computer hackers; Computer networks – Security measures; Computer crimes – Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guirguis, E. (2012). On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/2458

Chicago Manual of Style (16th Edition):

Guirguis, Emad. “On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications.” 2012. Masters Thesis, Texas State University – San Marcos. Accessed December 15, 2019. https://digital.library.txstate.edu/handle/10877/2458.

MLA Handbook (7th Edition):

Guirguis, Emad. “On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications.” 2012. Web. 15 Dec 2019.

Vancouver:

Guirguis E. On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications. [Internet] [Masters thesis]. Texas State University – San Marcos; 2012. [cited 2019 Dec 15]. Available from: https://digital.library.txstate.edu/handle/10877/2458.

Council of Science Editors:

Guirguis E. On the Effect of Jamming Attacks on Cyber Physical Systems with the Focus on Target Tracking Applications. [Masters Thesis]. Texas State University – San Marcos; 2012. Available from: https://digital.library.txstate.edu/handle/10877/2458

10. Makke, Ali. Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring.

Degree: Docteur es, Informatique et Réseaux, 2014, Université Paris Descartes – Paris V

L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où… (more)

Subjects/Keywords: Réseaux de capteurs médicaux sans fil; Systèmes WBAN; Détection des attaques; Jamming; Flooding; Mesure de divergence; Taux de détection; Taux de fausses détections; Wireless medical sensor networks; WBAN systems; Attack detection; Jamming; Flooding; Divergence measure; Detection rate; False detection rate; 004.6

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Makke, A. (2014). Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring. (Doctoral Dissertation). Université Paris Descartes – Paris V. Retrieved from http://www.theses.fr/2014PA05S006

Chicago Manual of Style (16th Edition):

Makke, Ali. “Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring.” 2014. Doctoral Dissertation, Université Paris Descartes – Paris V. Accessed December 15, 2019. http://www.theses.fr/2014PA05S006.

MLA Handbook (7th Edition):

Makke, Ali. “Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring.” 2014. Web. 15 Dec 2019.

Vancouver:

Makke A. Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring. [Internet] [Doctoral dissertation]. Université Paris Descartes – Paris V; 2014. [cited 2019 Dec 15]. Available from: http://www.theses.fr/2014PA05S006.

Council of Science Editors:

Makke A. Détection d'attaques dans un système WBAN de surveillance médicale à distance : Attacks detection in a WBAN system for remote medical monitoring. [Doctoral Dissertation]. Université Paris Descartes – Paris V; 2014. Available from: http://www.theses.fr/2014PA05S006

11. Guirguis, Emad. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.

Degree: 2013

Subjects/Keywords: JAMMING ATTACKS; CYBER PHYSICAL SYSTEMS; CPS; TARGET TRACKING APPLICATIONS; COMPUTER SCIENCE; MOBILE CPS; ATTACK PARADOX; SMART POLICIES; IMPROVED POLICY; Computer hackers; Computer networks – Security measures; Computer crimes – Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guirguis, E. (2013). ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. (Thesis). [No school.] Retrieved from http://hdl.handle.net/10529/ETD-TXSTATE-2012-05-307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Chicago Manual of Style (16th Edition):

Guirguis, Emad. “ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.” 2013. Thesis, [No school]. Accessed December 15, 2019. http://hdl.handle.net/10529/ETD-TXSTATE-2012-05-307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

MLA Handbook (7th Edition):

Guirguis, Emad. “ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.” 2013. Web. 15 Dec 2019.

Vancouver:

Guirguis E. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. [Internet] [Thesis]. [No school]; 2013. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10529/ETD-TXSTATE-2012-05-307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Council of Science Editors:

Guirguis E. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. [Thesis]. [No school]; 2013. Available from: http://hdl.handle.net/10529/ETD-TXSTATE-2012-05-307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

12. Guirguis, Emad. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.

Degree: 2013

Subjects/Keywords: JAMMING ATTACKS; CYBER PHYSICAL SYSTEMS; CPS; TARGET TRACKING APPLICATIONS; COMPUTER SCIENCE; MOBILE CPS; ATTACK PARADOX; SMART POLICIES; IMPROVED POLICY; Computer hackers; Computer networks – Security measures; Computer crimes – Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guirguis, E. (2013). ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. (Thesis). [No school.] Retrieved from http://hdl.handle.net/2249.1/62182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Chicago Manual of Style (16th Edition):

Guirguis, Emad. “ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.” 2013. Thesis, [No school]. Accessed December 15, 2019. http://hdl.handle.net/2249.1/62182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

MLA Handbook (7th Edition):

Guirguis, Emad. “ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS.” 2013. Web. 15 Dec 2019.

Vancouver:

Guirguis E. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. [Internet] [Thesis]. [No school]; 2013. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/2249.1/62182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

Council of Science Editors:

Guirguis E. ON THE EFFECT OF JAMMING ATTACKS ON CYBER PHYSICAL SYSTEMS WITH THE FOCUS ON TARGET TRACKING APPLICATIONS. [Thesis]. [No school]; 2013. Available from: http://hdl.handle.net/2249.1/62182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No school.

.