Mitigating the Effect of Malicious Users in Cognitive Networks
暂无分享,去创建一个
[1] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[2] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.
[3] Ian F. Akyildiz,et al. TP-CRAHN: a Transport Protocol for Cognitive Radio Ad-Hoc Networks , 2009, IEEE INFOCOM 2009.
[4] Sung-Bae Cho,et al. An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling , 2002, PRICAI.
[5] Syed Ali Khayam,et al. A Comparative Evaluation of Anomaly Detectors under Portscan Attacks , 2008, RAID.
[6] Sung-Bae Cho,et al. Intrusion Detection by Combining Multiple Hidden Markov Models , 2000, PRICAI.
[7] A. Lo,et al. Performance of Transport Control Protocol Over Dynamic Spectrum Access Links , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[8] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[9] Olga León Abarca,et al. A new cross-layer attack to TCP in cognitive radio networks , 2009 .
[10] Vir V. Phoha,et al. Investigating hidden Markov models capabilities in anomaly detection , 2005, ACM-SE 43.
[11] Rahul Khanna,et al. System approach to intrusion detection using hidden Markov model , 2006, IWCMC '06.
[12] Transport Layer Protocols for Cognitive Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[13] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[14] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[15] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[16] T.X. Brown,et al. Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[17] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[18] Sung-Bae Cho,et al. Efficient anomaly detection by modeling privilege flows using hidden Markov model , 2003, Comput. Secur..
[19] Fred Daneshgaran,et al. Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects , 2008, IEEE Transactions on Wireless Communications.
[20] Srinivasan Seshan,et al. A comparison of mechanisms for improving TCP performance over wireless links , 1996, SIGCOMM 1996.
[21] Ruoyu Wu,et al. Risk-Aware Response for Mitigating MANET Routing Attacks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[22] Jeonghoon Mo,et al. Performance Modeling of Communication Networks with Markov Chains , 2010, Performance Modeling of Communication Networks with Markov Chains.