Search Results for author: Youness Arjoune

Found 3 papers, 0 papers with code

Smart Jamming Attacks in 5G New Radio: A Review

no code implementations11 Sep 2020 Youness Arjoune, Saleh Faruque

Therefore, jamming 5G networks can be a real threat to public safety.

Artificial Intelligence for 5G Wireless Systems: Opportunities, Challenges, and Future Research Directions

no code implementations10 Sep 2020 Youness Arjoune, Saleh Faruque

The advent of the wireless communications systems augurs new cutting-edge technologies, including self-driving vehicles, unmanned aerial systems, autonomous robots, Internet-of-Things, and virtual reality.

Management

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

no code implementations8 Mar 2019 Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch

Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or causing harmful interference to the primary users.

valid

Cannot find the paper you are looking for? You can Submit a new open access paper.