Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/25629
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhou, Y-
dc.contributor.authorYeoh, PL-
dc.contributor.authorPan, C-
dc.contributor.authorWang, K-
dc.contributor.authorMa, Z-
dc.contributor.authorVucetic, B-
dc.contributor.authorLi, Y-
dc.date.accessioned2022-12-13T19:21:18Z-
dc.date.available2022-06-28-
dc.date.available2022-12-13T19:21:18Z-
dc.date.issued2022-06-28-
dc.identifier.citationZhou, Y. et al. (2022) 'Caching and UAV Friendly Jamming for Secure Communications With Active Eavesdropping Attacks', IEEE Transactions on Vehicular Technology, 71 (10), pp. 11251 - 11256. doi: 10.1109/TVT.2022.3186730.en_US
dc.identifier.issn0018-9545-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/25629-
dc.description.sponsorshipNatural Science Foundation of Sichuan under Grant 2022NSFSC0887; Fundamental Research Funds for the Central Universities under Grant 2682021ZTPY117 and 2682022CX020; ARC under Grant DP190100770; ARC Laureate Fellowship under Grant FL160100032; ARC under Grant DP190101988 and DP210103410.en_US
dc.format.extent11251 - 11256-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.rights.urihttps://www.ieee.org/publications/rights/rights-policies.html-
dc.subjectphysical layer securityen_US
dc.subjectUAV communicationsen_US
dc.subjectactive eavesdropperen_US
dc.subjectcachingen_US
dc.subjectjammingen_US
dc.titleCaching and UAV Friendly Jamming for Secure Communications With Active Eavesdropping Attacksen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1109/TVT.2022.3186730-
dc.relation.isPartOfIEEE Transactions on Vehicular Technology-
pubs.issue10-
pubs.publication-statusPublished-
pubs.volume71-
dc.identifier.eissn1939-9359-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.253.99 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.