Cognitive Security of Wireless Communication Systems in the Physical Layer
暂无分享,去创建一个
[1] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[2] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[3] Kaiyu Wan,et al. Context-Aware Security Solutions for Cyber-Physical Systems , 2012, Mobile Networks and Applications.
[4] Geethapriya Thamilarasu,et al. Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] Raymond Chi-Wing Wong,et al. On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas , 2013, Int. J. Distributed Sens. Networks.
[6] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[7] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[8] Tim Pateman,et al. Rural and urban areas: comparing lives using rural/urban classifications , 2011 .
[9] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[10] Xin Wang,et al. Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.
[11] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[12] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Xiang Li,et al. Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[15] Vicente Milanés Montero,et al. Controller for Urban Intersections Based on Wireless Communications and Fuzzy Logic , 2010, IEEE Transactions on Intelligent Transportation Systems.
[16] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[17] Tongtong Li,et al. Anti-Jamming Message-Driven Frequency Hopping—Part I: System Design , 2013, IEEE Transactions on Wireless Communications.
[18] Ting Wang,et al. Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.
[19] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[20] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[21] Mingbo Xiao,et al. Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[22] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.