Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations
暂无分享,去创建一个
[1] István Fazekas,et al. Longest runs in coin tossing. Comparison of recursive formulae, asymptotic theorems, computer simulations , 2010 .
[2] Yingjiu Li,et al. A security-enhanced one-time payment scheme for credit card , 2004, 14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings..
[3] Scott Campbell. How to think about security failures , 2006, CACM.
[4] Cormac Herley,et al. Why do Nigerian Scammers Say They are From Nigeria? , 2012, WEIS.
[5] Rajesh Krishnan,et al. Opportunistic spectrum access: challenges, architecture, protocols , 2006, WICON '06.
[6] David Gale,et al. Review: R. Duncan Luce and Howard Raiffa, Games and decisions: Introduction and critical survey , 1958 .