Author of the publication

Secrecy Outage of Dual-Hop Amplify-and-Forward Relay System with Diversity Combining at the Eavesdropper.

, , and . Wireless Personal Communications, 97 (1): 539-563 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things., , and . PIMRC, page 1-6. IEEE, (2017)Direction of Arrival Estimation and Beamforming of Multiple Coherent UWB Signals., and . ICC, page 1-5. IEEE, (2010)Improving Capacity in LMDS Networks Using Trellis-Coded Modulation.. EURASIP J. Wireless Comm. and Networking, 2004 (2): 365-373 (2004)Secure Energy Efficiency with Poisson Point Process Distributed Jammers., and . WF-IoT, page 19-23. IEEE, (2019)Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks., and . IEEE Trans. Vehicular Technology, 66 (4): 3088-3102 (2017)Secrecy outage of cooperative relay network with and without eavesdropper's direct link., , and . NCC, page 1-6. IEEE, (2017)Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying., , , , , and . CoRR, (2018)Resource Allocation in Secure Multicarrier AF Relay System Under Individual Power Constraints., and . IEEE Trans. Vehicular Technology, 66 (6): 5070-5085 (2017)An experimental validation of system level design space exploration methodology for energy efficient sensor nodes., , and . ISLPED, page 355-358. ACM, (2009)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)