4.7 Article

A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype

Alexandros G. Fragkiadakis et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2012)

Article Engineering, Electrical & Electronic

Modeling the Lion Attack in Cognitive Radio Networks

Juan Hernandez-Serrano et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2011)

Review Computer Science, Information Systems

Misbehavior Scenarios in Cognitive Radio Networks

Stamatios Arkoulis et al.

FUTURE INTERNET (2010)

Article Computer Science, Information Systems

A survey on MAC protocols for cognitive radio networks

Claudia Cormio et al.

AD HOC NETWORKS (2009)

Article Engineering, Electrical & Electronic

IEEE 802.22: The First Cognitive Radio Wireless Regional Area Network Standard

Carl R. Stevenson et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Computer Science, Information Systems

A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications

Tevfik Yucek et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Computer Science, Hardware & Architecture

Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments

Alvaro A. Cardenas et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2009)

Article Computer Science, Information Systems

Enhanced Robust Cooperative Spectrum Sensing in Cognitive Radio

Feng Zhu et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2009)

Article Engineering, Electrical & Electronic

Toward secure distributed spectrum sensing in cognitive radio networks

Ruiliang Chen et al.

IEEE COMMUNICATIONS MAGAZINE (2008)

Article Engineering, Electrical & Electronic

Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks

Zhi Quan et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2008)

Article Engineering, Electrical & Electronic

Defense against primary user emulation attacks in cognitive radio networks

Ruiliang Chen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2008)

Article Engineering, Electrical & Electronic

HC-MAC: A hardware-constrained cognitive MAC for efficient spectrum management

Juncheng Jia et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2008)

Article Computer Science, Information Systems

OS-MAC: An efficient MAC protocol for spectrum-agile wireless networks

Bechir Hamdaoui et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2008)

Article Engineering, Electrical & Electronic

Robust detection of selfish misbehavior in wireless networks

Alberto Lopez Toledo et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2007)

Article Computer Science, Hardware & Architecture

Applications of machine learning to cognitive radio networks

Charles Clancy et al.

IEEE WIRELESS COMMUNICATIONS (2007)

Article Engineering, Electrical & Electronic

Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework

Qing Zhao et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2007)

Article Computer Science, Information Systems

On capacity under receive and spatial spectrum-sharing constraints

Michael Gastpar

IEEE TRANSACTIONS ON INFORMATION THEORY (2007)

Article Engineering, Electrical & Electronic

On the energy detection of unknown signals over fading channels

Fadel F. Digham et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2007)

Article Computer Science, Hardware & Architecture

NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey

Ian F. Akyildiz et al.

COMPUTER NETWORKS (2006)

Review Computer Science, Hardware & Architecture

Wireless mesh networks: a survey

IF Akyildiz et al.

COMPUTER NETWORKS (2005)

Article Engineering, Electrical & Electronic

A framework for secure download for software-defined radio

LB Michael et al.

IEEE COMMUNICATIONS MAGAZINE (2002)

Article Computer Science, Information Systems

Voice over IP performance monitoring

RG Cole et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)

Article Computer Science, Artificial Intelligence

Combining belief functions when evidence conflicts

CK Murphy

DECISION SUPPORT SYSTEMS (2000)