Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment
暂无分享,去创建一个
[1] Panagiotis Papadimitratos,et al. A bandwidth sharing approach to improve licensed spectrum utilization , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[2] T. Brown,et al. Potential Cognitive Radio Denial of Service Attacks and Remedies , 2007 .
[3] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[4] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[5] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Prasun Sinha,et al. Understanding TCP fairness over wireless LAN , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[8] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] D. Sicker,et al. Can Cognitive Radio Support Broadband Wireless Access? , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[11] J.M. Chapin,et al. Time-Limited Leases for Innovative Radios , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[12] Allen D. Householder,et al. Managing the Threat of Denial-of-Service Attacks , 2001 .
[13] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[14] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[15] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[16] L. Ma,et al. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[17] Acm Sigmobile. MobiHoc 2006 : proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, May 22-25, 2006, Florence, Italy , 2006 .
[18] J. A. Volpe. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning Syst , 2001 .
[19] Jeffrey H. Reed,et al. Outage probability based comparison of underlay and overlay spectrum sharing techniques , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[20] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.