A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING
2020
Journal of Computer Science and Cybernetics
More importantly, security capability trade-offbetween secondary and primary networks can be totally controlled with appropriate selection of systemparameters. ...
primary informationagainst an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.Security capability of both secondary and primary networks are analyzed in terms of secrecy ...
The label "varepsilon" on the x axis is ε Figure 6 shows the SOPs w.r.t ε with parameters of Figure 2 excepting P t /N 0 = 10 dB. ...
doi:10.15625/1813-9663/36/3/14987
fatcat:xnlgakq4c5ba5d4melyseaeo4i