Detection of Overshadowing Attack in 4G and 5G Networks
IEEE/ACM Transactions on Networking(2024)
Key words
5G mobile communication,Jamming,Open RAN,Downlink,Synchronization,Symbols,Computer architecture,Base stations,Accuracy,Protocols,Overshadowing,attack detection,reservoir computing,O-RAN
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined