1. Baldini, G., Picchi, O., Luise, M., Sturman, T. A., vergari, F., Moy, C., et al. (2012). The euler project: Application of software defined radio in joint security operations. IEEE Communications Magazine, 50(3), 55–71.
2. Constantiou, I. D., & Mahnke, V. (2010). Consumer behaviour and mobile TV services: Do men differ from women in their adoption intentions? Journal of Electronic Commerce Research, 11(2), 127–139.
3. Crochiere, R. E., Tribolet, J. M., & Rabiner, L. R. (1950). An interpretation of the log likelihood ratio as a measure of waveform coder performance. IEEE Transactions on Acoustics, Speech, and Signal Processing, ASSP–25(3), 315–323.
4. Eldin, S. M. S., Khamis, S. A., Hassanin, A.-A. I. M., Alsharqawy, M. A. (2013). ERTU’s package for gray image watermark application. Journal of Selected Areas in Telecommunications (JSAT), October Edition, 2013.
5. Elmasry, G. F., Jain, M., Welsh, R., Jakubowski, K., & Wittaker, K. (2012). Security and network operations challenges with cellular infrastructure in the tactical Theater. IEEE Communications Magazine, 50(3), 72–80.