暂无分享,去创建一个
[1] Anuran Makur,et al. Information Capacity of BSC and BEC Permutation Channels , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Ian Brown. Lawful Interception Capability Requirements , 2013 .
[3] Cristina Cano,et al. srsLTE: an open-source platform for LTE evolution and experimentation , 2016, WiNTECH@MobiCom.
[4] S. Sargento,et al. LoRa Connectivity Analysis for Urban Coverage in Real Mobile Environments , 2021, 2021 Telecoms Conference (ConfTELE).
[5] Abhishek Singh,et al. Malicious ICMP Tunneling: Defense against the Vulnerability , 2003, ACISP.
[6] Seppo Horsmanheimo,et al. Latency analysis of LTE network for M2M applications , 2015, 2015 13th International Conference on Telecommunications (ConTEL).
[7] Stig Fr. Mjølsnes,et al. Easy 4G/LTE IMSI Catchers for Non-Programmers , 2017, MMM-ACNS.
[8] Rongfeng Zheng,et al. A comprehensive survey on DNS tunnel detection , 2021, Comput. Networks.
[9] Sergey Andreev,et al. Non-Terrestrial Networks in 5G & Beyond: A Survey , 2020, IEEE Access.
[10] Sergio Verdú,et al. Generalizing the Fano inequality , 1994, IEEE Trans. Inf. Theory.
[11] Roger Piqueras Jover,et al. Connection-less communication of IoT devices over LTE mobile networks , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[12] Yuanqing Zheng,et al. CloakLoRa: A Covert Channel over LoRa PHY , 2020, 2020 IEEE 28th International Conference on Network Protocols (ICNP).
[13] Jianfang Li,et al. The study of APT attack stage model , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).