Secure distributed spectrum sensing in cognitive radio networks using multi-armed bandits
暂无分享,去创建一个
[1] Peng Ning,et al. Anti-jamming communication in cognitive radio networks with unknown channel statistics , 2011, 2011 19th IEEE International Conference on Network Protocols.
[2] Victor C. M. Leung,et al. Denial of Service Attacks in Cognitive Radio Networks through Channel Eviction Triggering , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Steven L. Scott,et al. A modern Bayesian look at the multi-armed bandit , 2010 .
[4] Bhaskar Krishnamachari,et al. Distributed learning under imperfect sensing in cognitive radio networks , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[5] Jin Wei,et al. Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[6] Zhiqiang Li,et al. Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..
[7] Kang G. Shin,et al. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.
[8] Victor C. M. Leung,et al. Combating channel eviction triggering denial-of-service attacks in cognitive radio networks , 2012, Trans. Emerg. Telecommun. Technol..
[9] L. Tierney. Markov Chains for Exploring Posterior Distributions , 1994 .
[10] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[11] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[12] Jun Cai,et al. Secure cooperative multi-channel spectrum sensing in cognitive radio networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[13] Abolfazl Falahati,et al. SSDF protection in cooperative spectrum sensing employing a computational trust evaluation algorithm , 2010, 2010 5th International Symposium on Telecommunications.
[14] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[15] Hai Jiang,et al. Medium access in cognitive radio networks: A competitive multi-armed bandit framework , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[16] Jun Gao,et al. Attacker-exclusion scheme for cooperative spectrum sensing against SSDF attacks based on accumulated suspicious level , 2011, 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems.