Securing cognitive radio networks
暂无分享,去创建一个
[1] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[2] Sai Shankar Nandagopalan,et al. IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..
[3] Witold Kinsner,et al. A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.
[4] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[5] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[6] P. Bahl,et al. DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[7] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[8] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[9] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[10] Yunnan Wu,et al. KNOWS: Cognitive Radio Networks Over White Spaces , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[11] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[12] Oriol Sallent,et al. A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[13] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[14] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[15] Eitan Altman,et al. A survey of TCP over ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[16] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[17] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[18] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[19] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[20] Juan Hernández-Serrano,et al. Shared Self-Organized GKM Protocol for MANETs , 2008, J. Inf. Sci. Eng..
[21] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[22] Chang N. Zhang,et al. Integrated approach for fault tolerance and digital signature in RSA , 1999 .
[23] Vern Paxson,et al. Computing TCP's Retransmission Timer , 2000, RFC.
[24] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[25] Vipul Gupta,et al. Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[26] Jorge Lobo,et al. Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.
[27] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[28] Olga Leon,et al. A new cross-layer attack to TCP in cognitive radio networks , 2009, 2009 Second International Workshop on Cross Layer Design.
[29] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[30] M.M. Buddhikot,et al. Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-Channel Femto Cell Underlays , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[31] Danijela Cabric,et al. White paper: Corvus: A cognitive radio approach for usage of virtual unlicensed spectrum , 2004 .
[32] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[33] Milind M. Buddhikot,et al. DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[34] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.