A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
暂无分享,去创建一个
Naima Kaabouch | Youness Arjoune | Fatima Salahdine | Elias Ghribi | Md. Shoriful Islam | Md. Shoriful Islam | N. Kaabouch | Fatima Salahdine | Youness Arjoune | Elias Ghribi
[1] Saewoong Bahk,et al. Mitigating stealthy jamming attacks in low-power and lossy wireless networks , 2018, Journal of Communications and Networks.
[2] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[3] Ying Lin,et al. Distributed detection of jamming and defense in wireless sensor networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[4] Yuanqing Xia,et al. Security Research on Wireless Networked Control Systems Subject to Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[5] Carlo S. Regazzoni,et al. Jammer detection algorithm for wide-band radios using spectral correlation and neural networks , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[6] Naima Kaabouch,et al. Social Engineering Attacks: A Survey , 2019, Future Internet.
[7] Naima Kaabouch,et al. RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks , 2019, 2019 IEEE International Conference on Electro Information Technology (EIT).
[8] Faissal El Bouanani,et al. Network layer attacks and countermeasures in cognitive radio networks: A survey , 2018, J. Inf. Secur. Appl..
[9] Rami G. Melhem,et al. Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.
[10] M. Velempini,et al. The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks , 2018, 2018 Conference on Information Communications Technology and Society (ICTAS).
[11] César Cárdenas,et al. Epidemic routing in vehicular delay-tolerant networks: The use of heterogeneous conditions to increase packet delivery ratio , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).
[12] Roberto Di Pietro,et al. Jamming mitigation in cognitive radio networks , 2013, IEEE Network.
[13] Manjunath R. Kounte,et al. PHY-layer key exchange for wireless communication , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[14] Alvin S. Lim,et al. Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..
[15] Tae-Gyu Chang,et al. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks , 2016, Sensors.
[16] Zhuo Lu,et al. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.
[17] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[18] Nazar Abbas Saqib,et al. Detection of jamming attacks in 802.11b wireless networks , 2013, EURASIP Journal on Wireless Communications and Networking.
[19] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[20] Yi Ling,et al. Time Series Analysis for Jamming Attack Detection in Wireless Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[21] George K. Karagiannidis,et al. Neural network based PHY-layer key exchange for wireless communications , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[22] Klaus Wehrle,et al. Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[23] Naima Kaabouch,et al. Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .
[24] Wajdi Alhakami,et al. Spectrum sharing security and attacks in CRNs: a review , 2014 .