Localization in Cognitive Radio Systems In The Presence of Spatially Obfuscated Data
暂无分享,去创建一个
[1] Jianhua Li,et al. Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence , 2006, 2006 International Conference on Communications, Circuits and Systems.
[2] Petri Mähönen,et al. Understanding conditions that lead to emulation attacks in dynamic spectrum access , 2011, IEEE Communications Magazine.
[3] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[4] Audun Jøsang,et al. The consensus operator for combining beliefs , 2002, Artif. Intell..
[5] Glenn Shafer,et al. Perspectives on the theory and practice of belief functions , 1990, Int. J. Approx. Reason..
[6] Zhu Han,et al. Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[7] Symeon Papavassiliou,et al. Data fusion algorithms for network anomaly detection: classification and evaluation , 2007, International Conference on Networking and Services (ICNS '07).
[8] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[9] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[10] Zhu Han,et al. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..
[11] Ronald Fagin,et al. Two Views of Belief: Belief as Generalized Probability and Belief as Evidence , 1992, Artif. Intell..
[12] Jeffrey T. Henrikson. Completeness and Total Boundedness of the Hausdorff Metric , 1999 .
[13] Basil S. Maglaris,et al. One step ahead to multisensor data fusion for DDoS detection , 2005, J. Comput. Secur..
[14] Zhu Han,et al. CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[15] Lara Dolecek,et al. Joint Spectrum Sensing and Detection of Malicious Nodes via Belief Propagation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[16] Ehab Al-Shaer,et al. Overlay Fault Diagnosis Based on Evidential Reasoning , 2009, IEEE INFOCOM 2009.
[17] Song Han,et al. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[18] Xiaohong Yuan,et al. Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory , 2007, Inf. Fusion.
[19] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Venugopal V. Veeravalli,et al. Cooperative Sensing for Primary Detection in Cognitive Radio , 2008, IEEE Journal of Selected Topics in Signal Processing.
[21] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[22] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.