Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks
暂无分享,去创建一个
[1] Do-Hoon Kim,et al. Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.
[2] Friedrich Jondral,et al. Calculation of detection and false alarm probabilities in spectrum pooling systems , 2005, IEEE Communications Letters.
[3] Sumit Roy,et al. Analysis of Search Schemes in Cognitive Radio , 2007 .
[4] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[5] Yu Ted Su,et al. A sequential test based cooperative spectrum sensing scheme for cognitive radios , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[6] Mohammed Atiquzzaman,et al. Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid , 2016, Ad Hoc Networks.
[7] Romeo Giuliano,et al. Interoperability between WiMAXand broadband mobile space networks [topics in radio communications] , 2008, IEEE Communications Magazine.
[8] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[9] Parth H. Pathak,et al. On insider misbehavior detection in cognitive radio networks , 2013, IEEE Network.
[10] Li Xu,et al. Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks , 2015, Int. J. Distributed Sens. Networks.
[11] Devendra Jalihal,et al. Performance of p-Norm Detector in Cognitive Radio Networks with Cooperative Spectrum Sensing in Presence of Malicious Users , 2017, Wirel. Commun. Mob. Comput..
[12] Pramod K. Varshney,et al. Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Amit Kumar Mishra,et al. Efficient elimination of erroneous nodes in cooperative sensing for cognitive radio networks , 2016, Comput. Electr. Eng..
[14] Peng Ning,et al. A Byzantine attack defender: The Conditional Frequency Check , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.