2015 International Siberian Conference on Control and Communications (SIBCON) 2015
DOI: 10.1109/sibcon.2015.7147083
|View full text |Cite
|
Sign up to set email alerts
|

Consideration of methods to protect frequency resources of satellite system against unauthorized access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The method based on the use of cones is described in the paper [7]. With high accuracy it can be assumed that emitting of the antenna on board of the satellite forms in space a circular conical surface, the apex of which is the subsatellite point.…”
Section: B Methods Based On the Use Of Consmentioning
confidence: 99%
See 1 more Smart Citation
“…The method based on the use of cones is described in the paper [7]. With high accuracy it can be assumed that emitting of the antenna on board of the satellite forms in space a circular conical surface, the apex of which is the subsatellite point.…”
Section: B Methods Based On the Use Of Consmentioning
confidence: 99%
“…The coordinates of the RT can be determined by measuring the phase difference between the signals emitted by them in these positions of the satellite. [6][7] However, this method does not allow to determine the coordinates of the RT in case if it is unknown whether the RT is located on the Earth's surface or outside it.…”
Section: A Radio Transmitter Is Located On the Earth's Surfacementioning
confidence: 99%