Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique
暂无分享,去创建一个
[1] Tongtong Li,et al. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.
[2] Lokesh Chouhan,et al. Secure and trusted algorithm for cognitive radio network , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
[3] Rong Zheng,et al. On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.
[4] Soung Chang Liew,et al. Hot topic: physical-layer network coding , 2006, MobiCom '06.
[5] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[6] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[7] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[8] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[9] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[10] S. Arkoulis,et al. Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[11] Y. Raghavender Rao,et al. APPLICATION OF NORMALIZED CROSS CORRELATION TO IMAGE REGISTRATION , 2014 .
[12] Soung Chang Liew,et al. Channel coding and decoding in a relay system operated with physical-layer network coding , 2008, IEEE Journal on Selected Areas in Communications.
[13] John C. S. Lui,et al. Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[14] Charles M. Grinstead,et al. Introduction to probability , 1999, Statistics for the Behavioural Sciences.
[15] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[16] Prasant Mohapatra,et al. Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.
[17] Yu-Dong Yao,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.
[18] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .
[19] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .
[20] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[21] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .