Analysis of reliability based algorithm for cognitive networks
暂无分享,去创建一个
[1] R. Chandramouli,et al. Pricing for Security and QoS in Cognitive Radio Networks , 2016 .
[2] Garimella Rama Murthy,et al. Doubly Cognitive Architecture Based Cognitive Wireless Sensor Networks , 2011, Int. J. Wirel. Networks Broadband Technol..
[3] Vahid Rafe,et al. A security framework for developing service-oriented software architectures , 2015, Secur. Commun. Networks.
[4] Chang-Tien Lu,et al. Non-parametric passive traffic monitoring in cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Mohamed Aymen Chalouf,et al. PHY/MAC signalling protocols for resilient cognitive radio networks , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[6] John Strassner. The Role of Autonomic Networking in Cognitive Networks , 2007 .
[7] C. N. Mathur,et al. Security Issues in Cognitive Radio Networks , 2007 .
[8] Mehdi Hosseinzadeh,et al. Quantum-resistance authentication in centralized cognitive radio networks , 2016, Secur. Commun. Networks.
[9] Hossein Saiedian,et al. A survey of client-side Web threats and counter-threat measures , 2012, Secur. Commun. Networks.
[10] Mukesh Kumar,et al. A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks , 2015 .
[11] Wu Wei. The research of cognitive communication networks , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[12] Lokesh Chouhan,et al. Security for Cognitive Radio Networks , 2013 .
[13] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[14] Jaydip Sen,et al. Security and Privacy Challenges in Cognitive Wireless Sensor Networks , 2013, ArXiv.
[15] Hsiao-Hwa Chen,et al. Cognitive Radio Networks: Architectures, Protocols, and Standards , 2010 .
[16] Iti Saha Misra,et al. VoIP based two-tier Cognitive Radio Network: Developing implementation techniques , 2013, 2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT).
[17] J. Herrera-Joancomartí,et al. Security and Privacy Concerns About the RFID Layer of EPC Gen 2 Networks , 2014 .
[18] Mark Michael. Physical Security Threats and Measures , 2012 .
[19] Zhiqiang Li,et al. Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..