Analogous Study of Security Threats in Cognitive Radio
暂无分享,去创建一个
Izhar Ahmed Sohu | Asif Ahmed Rahimoon | Amjad Ali Junejo | Arsalan Ahmed Sohu | Sadam Hussain Junejo
[1] Zhu Han,et al. Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[2] Yenumula B. Reddy,et al. Security Issues and Threats in Cognitive Radio Networks , 2013 .
[3] O. P. Meena,et al. Comparative Analysis of Information Fusion Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2014 .
[4] Zhou Xianwei,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .
[5] B. Mounika,et al. Spectrum Sensing Techniques and Issues in Cognitive Radio , 2013 .
[6] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[7] Nei Kato,et al. Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.
[8] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[9] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[10] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[11] Jianfeng Wang,et al. Cognitive Radio Based Wireless Sensor Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.