Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks
暂无分享,去创建一个
[1] Mohamed-Slim Alouini,et al. Collaborative spectrum sensing based on upper bound on joint PDF of extreme eigenvalues , 2011, 2011 19th European Signal Processing Conference.
[2] M. Imran,et al. Geometric Mean Detector for Spectrum Sensing , 2011 .
[3] S Maleki,et al. Energy-Efficient Distributed Spectrum Sensing for Cognitive Sensor Networks , 2011, IEEE Sensors Journal.
[4] Olav Tirkkonen,et al. Spectrum sensing with Gaussian approximated eigenvalue ratio based detection , 2010, 2010 7th International Symposium on Wireless Communication Systems.
[5] R. Umarani,et al. Data Security in Local Area Network Based on Fast Encryption Algorithm , 2010, CNSA.
[6] Russell Jones,et al. Network security in two-year colleges , 2010 .
[7] Geoffrey Ye Li,et al. Energy-Efficient Transmission in Cognitive Radio Networks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[8] Namdeo V. Kalyankar,et al. Penetration Testing: A Roadmap to Network Security , 2009, ArXiv.
[9] Tim Kindberg,et al. Authenticating Public Wireless Networks with Physical Evidence , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[10] Raheem A. Beyah,et al. Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC , 2009, SecureComm.
[11] Bo Yan,et al. Robust Detection of Unauthorized Wireless Access Points , 2009, Mob. Networks Appl..
[12] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] Hyuk Lim,et al. Secure Framework for Multipath Multimedia Streaming over Wireless Ad Hoc Network , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[14] Roberto Garello,et al. Cooperative spectrum sensing based on the limiting eigenvalue ratio distribution in wishart matrices , 2009, IEEE Communications Letters.
[15] Damon McCoy,et al. Mitigating Evil Twin Attacks in 802.11 , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[16] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[17] Tim Jordon,et al. Hacking: Digital Media and Technological Determinism , 2008 .
[18] Yonghong Zeng,et al. Eigenvalue-based spectrum sensing algorithms for cognitive radio , 2008, IEEE Transactions on Communications.
[19] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[20] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.
[21] Volker Roth,et al. Simple and effective defense against evil twin access points , 2008, WiSec '08.
[22] Stephen Flowers,et al. Harnessing the hackers: The emergence and exploitation of Outlaw Innovation , 2008 .
[23] Raheem A. Beyah,et al. A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[24] Yiyang Pei,et al. Sensing-Throughput Tradeoff in Cognitive Radio Networks: How Frequently Should Spectrum Sensing be Carried Out? , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[25] Sachin Shetty,et al. Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[26] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[27] Tae-Hyung Kim,et al. Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks , 2006, Inscrypt.
[28] George Kurtz,et al. Hacking Exposed , 2005 .
[29] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[30] Raheem A. Beyah,et al. Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[31] Tristan Henderson,et al. The changing usage of a mature campus-wide wireless network , 2004, MobiCom '04.
[32] Katerina J. Argyraki,et al. Scalable network-layer defense against internet bandwidth-flooding attacks , 2003, TNET.
[33] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[34] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[35] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[36] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[37] Kjell Jørgen Hole,et al. Open Wireless Networks on University Campuses , 2008, IEEE Security & Privacy.
[38] Jack McCullough,et al. Caution! Wireless Networking: Preventing a Data Disaster , 2004 .
[39] Stefan Savage,et al. Denial-of-Service Attacks : Real Vulnerabilities and Practical Solutions , 2003 .
[40] Ivan Marsic,et al. Fuzzy Reasoning for Wireless Awareness , 2001, Int. J. Wirel. Inf. Networks.
[41] William Stallings,et al. Data and Computer Communications , 1985 .
[42] Cuihong Wu,et al. 2010 2nd International Conference on Industrial and Information Systems the Problems in Campus Network Information Security and Its Solutions , 2022 .