logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Securing Unmanned Aerial Vehicle Networks Models And Algorithms Bin Duo

  • SKU: BELL-53757628
Securing Unmanned Aerial Vehicle Networks Models And Algorithms Bin Duo
$ 31.00 $ 45.00 (-31%)

4.1

20 reviews

Securing Unmanned Aerial Vehicle Networks Models And Algorithms Bin Duo instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 3.36 MB
Pages: 137
Author: Bin Duo, Xiaojun Yuan, Yifan Liu
ISBN: 9783031456046, 3031456041
Language: English
Year: 2023

Product desciption

Securing Unmanned Aerial Vehicle Networks Models And Algorithms Bin Duo by Bin Duo, Xiaojun Yuan, Yifan Liu 9783031456046, 3031456041 instant download after payment.

This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

Related Products