Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3084213
Abstract: There is illegitimate transmission of information between suspicious users, whereas single legitimate monitor (LM) has finite capacity to satisfy eavesdropping. This letter studies a cooperative proactive eavesdropping(CPE) scheme, where two LMs eavesdrop on multiple suspicious…
read more here.
Keywords:
eavesdropping;
proactive eavesdropping;
cooperative proactive;
based deep ... See more keywords