Author of the publication

Shifted 2-N-PSK Method for the Detection of Pilot Contamination Attacks.

, , , and . Wirel. Pers. Commun., 118 (3): 1945-1970 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Narrowband Interference Suppression in Wireless OFDM Systems., , , and . Afr. J. Inf. Commun. Technol., (2009)Improving cell edge throughput for LTE using combined uplink power control., , and . Telecommun. Syst., 52 (3): 1541-1547 (2013)Software Application for Smile Design Automation Using the Visagism Theory., , , , , , and . CompSysTech, page 237-244. ACM, (2016)Optimization of Wireless Node Discovery in an IoT Network., , , and . GLOBECOM Workshops, page 1-5. IEEE, (2015)Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT., , , and . NCA, page 1-5. IEEE, (2021)Studying the effect of internal DOS attacks over SDN controller during switch registration process., and . ISNCC, page 1-4. IEEE, (2022)Performance comparison of NBI suppression methods for MIMO OSTBC-OFDM systems., , and . LCN, page 630-633. IEEE Computer Society, (2011)Expanding Parallel Resources for Medium-Density Languages for Free., and . LREC, page 3937-3943. European Language Resources Association (ELRA), (2012)New adaptive complex IIR filters and their application in OFDM systems., , , and . Signal Image Video Process., 4 (2): 197-207 (2010)Shifted 2-N-PSK Method for the Detection of Pilot Contamination Attacks., , , and . Wirel. Pers. Commun., 118 (3): 1945-1970 (2021)