Secure and reliable routing in cognitive radio networks
暂无分享,去创建一个
[1] Ying-Chang Liang,et al. A retransmission-based scheme for video streaming over wireless channels , 2010, CMC 2010.
[2] Athanasios V. Vasilakos,et al. Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[3] Athanasios V. Vasilakos,et al. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks , 2015, IEEE/ACM Transactions on Networking.
[4] Yue Zhang,et al. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.
[5] Juebo Wu,et al. Research and Analysis on Cognitive Radio Network Security , 2012 .
[6] Naixue Xiong,et al. Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.
[7] Athanasios V. Vasilakos,et al. A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks , 2014, IEEE Transactions on Network and Service Management.
[8] Chittabrata Ghosh,et al. Secure Communication in Cognitive Radio Networks , 2022 .
[9] Muheet Ahmed Butt,et al. COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS , 2013 .
[10] Athanasios V. Vasilakos,et al. Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks , 2015, IEEE Transactions on Computers.
[11] Athanasios V. Vasilakos,et al. Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..
[12] Athanasios V. Vasilakos,et al. Interoperable and adaptive fuzzy services for ambient intelligence applications , 2010, TAAS.
[13] Athanasios V. Vasilakos,et al. CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.
[14] Athanasios V. Vasilakos,et al. Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..
[15] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[16] Athanasios V. Vasilakos,et al. Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.
[17] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[18] Xiaolei Dong,et al. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.
[19] Athanasios V. Vasilakos,et al. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.
[20] Quanyan Zhu,et al. Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[21] Athanasios V. Vasilakos,et al. Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.
[22] Athanasios V. Vasilakos,et al. QoE-Driven Channel Allocation Schemes for Multimedia Transmission of Priority-Based Secondary Users over Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[23] Athanasios V. Vasilakos,et al. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.
[24] Athanasios V. Vasilakos,et al. Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.
[25] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[26] Athanasios V. Vasilakos,et al. Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.
[27] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[28] Athanasios V. Vasilakos,et al. Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..
[29] Natarajan Meghanathan,et al. A Survey on the Communication Protocols and Security in Cognitive Radio Networks , 2013, Int. J. Commun. Networks Inf. Secur..
[30] A. Prabhakaran,et al. AN EFFICIENT COMMUNICATION AND SECURITY FOR COGNITIVE RADIO NETWORKS , 2013 .
[31] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[32] Junaid Qadir,et al. Artificial intelligence based cognitive routing for cognitive radio networks , 2013, Artificial Intelligence Review.
[33] Athanasios V. Vasilakos,et al. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[34] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[35] Athanasios V. Vasilakos,et al. Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[36] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.