-
1
-
-
33745648091
-
NeXt generation dynamic spectrum access cognitive radio wireless networks: A survey
-
I. F. Akyildiz, W. Y. Lee, M. C. Vuran, S. Mohanty, "NeXt generation dynamic spectrum access cognitive radio wireless networks: A survey," Computer Networks, 50, 2006 pp. 2127-2159.
-
(2006)
Computer Networks
, vol.50
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.Y.2
Vuran, M.C.3
Mohanty, S.4
-
2
-
-
51349109475
-
An analysis of licensed channel avoidance strategies for unlicensed devices
-
Nov. 8-11
-
T. X. Brown, "An analysis of licensed channel avoidance strategies for unlicensed devices," in Proc. IEEE DySPAN, Nov. 8-11, 2005.
-
(2005)
Proc. IEEE DySPAN
-
-
Brown, T.X.1
-
3
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
MobiHoc, Florence, 22-25 May
-
T. X. Brown, J. E. James, A. Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in Proc. Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Florence, 22-25 May 2006.
-
(2006)
Proc. Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
4
-
-
84880458547
-
Potential cognitive radio denial of service attacks and remedies
-
ISART, Boulder, 26-28 Feb, 2007
-
T. X. Brown, A. Sethi, "Potential cognitive radio denial of service attacks and remedies," in Proc. International Symposium on Advanced Radio Technologies 2007 (ISART 2007), Boulder, 26-28 Feb. 2007.
-
(2007)
Proc. International Symposium on Advanced Radio Technologies
-
-
Brown, T.X.1
Sethi, A.2
-
5
-
-
34548774084
-
Can cognitive radio support broadband wireless access?
-
April 17-20
-
T. X. Brown, D. Sicker, "Can cognitive radio support broadband wireless access?," in Proc. IEEE DySPAN, April 17-20, 2007.
-
(2007)
Proc. IEEE DySPAN
-
-
Brown, T.X.1
Sicker, D.2
-
6
-
-
34548724018
-
-
J. M. Chapin, W. H. Lehr, Time-limited leases for innovative radios, in Proc. IEEE DySPAN. April 17-20, 2007.
-
J. M. Chapin, W. H. Lehr, "Time-limited leases for innovative radios," in Proc. IEEE DySPAN. April 17-20, 2007.
-
-
-
-
7
-
-
51349115415
-
-
DARPA XG Working Group, The XG vision, Request for Comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass, USA. July 2003
-
DARPA XG Working Group, "The XG vision," Request for Comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July 2003.
-
-
-
-
8
-
-
51349120885
-
-
DARPA XG Working Group, The XG architectural framework, Request for Comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass, USA. July 2003
-
DARPA XG Working Group, "The XG architectural framework," Request for Comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July 2003.
-
-
-
-
9
-
-
51349083506
-
-
End-to-End Reconfigurability (E2R) Phase II website (e2r2.motlabs.com).
-
End-to-End Reconfigurability (E2R) Phase II website (e2r2.motlabs.com).
-
-
-
-
10
-
-
51349121800
-
-
FCC ET Docket No. 02-135, Spectrum policy task force report, Nov. 2002. (http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-228542Al.pdf).
-
FCC ET Docket No. 02-135, "Spectrum policy task force report," Nov. 2002. (http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-228542Al.pdf).
-
-
-
-
11
-
-
51349090848
-
-
FCC ET Docket No. 03-108, Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, FCC Report and Order adopted on March 10, 2005, (http://gullfoss2.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdf&id_d ocument=6517509341).
-
FCC ET Docket No. 03-108, "Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies," FCC Report and Order adopted on March 10, 2005, (http://gullfoss2.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdf&id_d ocument=6517509341).
-
-
-
-
12
-
-
51349146369
-
-
FCC ET Docket No. 04-186, Unlicensed operation in the TV broadcast bands, ET Docket No. 02-380, Additional spectrum for unlicensed devices below 900 mhz and in the 3 ghz band, FCC Report and Order And Further Notice of Proposed Rulemaking, adopted on October 12, 2006.
-
FCC ET Docket No. 04-186, "Unlicensed operation in the TV broadcast bands," ET Docket No. 02-380, "Additional spectrum for unlicensed devices below 900 mhz and in the 3 ghz band," FCC Report and Order And Further Notice of Proposed Rulemaking, adopted on October 12, 2006.
-
-
-
-
13
-
-
0041438381
-
-
M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, Performance anomaly of 802.11b, in Proc. of INFOCOM 2003, v. 2, 30 Mar. - 3 Apr. 2003, pp. 836-843.
-
M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, "Performance anomaly of 802.11b," in Proc. of INFOCOM 2003, v. 2, 30 Mar. - 3 Apr. 2003, pp. 836-843.
-
-
-
-
14
-
-
51349123340
-
-
A. Householder, A. Manion, L Pesante and G. M. Weaver, Managing the threat of denial-of-service attacks, CERT Coordination Center, v 10.0, October 2001.
-
A. Householder, A. Manion, L Pesante and G. M. Weaver, "Managing the threat of denial-of-service attacks," CERT Coordination Center, v 10.0, October 2001.
-
-
-
-
15
-
-
0035789229
-
-
ACM press, New York, NY
-
J. Hubaux, L. Buttyan and S. Čapkun, "The quest for security in mobile ad hoc networks," ACM press, New York, NY, 2001.
-
(2001)
The quest for security in mobile ad hoc networks
-
-
Hubaux, J.1
Buttyan, L.2
Čapkun, S.3
-
16
-
-
33749065326
-
Dynamic open spectrum sharing MAC protocol for wireless ad hoc network
-
Nov. 8-11
-
L. Ma, X. Han, C.-C. Shen, "Dynamic open spectrum sharing MAC protocol for wireless ad hoc network," in Proc. IEEE DySpan, Nov. 8-11, 2005, pp. 203-213.
-
(2005)
Proc. IEEE DySpan
, pp. 203-213
-
-
Ma, L.1
Han, X.2
Shen, C.-C.3
-
17
-
-
33749057263
-
Outage probability based comparison of underlay and overlay spectrum sharing techniques
-
Nov. 8-11
-
R. Menon, R. M. Buehrer, J. H. Reed, "Outage probability based comparison of underlay and overlay spectrum sharing techniques," in Proc. IEEE DySpan, Nov. 8-11, 2005, pp. 101-109.
-
(2005)
Proc. IEEE DySpan
, pp. 101-109
-
-
Menon, R.1
Buehrer, R.M.2
Reed, J.H.3
-
18
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
26-27 Apr
-
J. Newsome, E. Shi, D. Song, A. Perrig, "The Sybil attack in sensor networks: analysis & defenses." in Proc. of Third International Symposium on Information Processing in Sensor Networks, IPSN, 26-27 Apr. 2004, pp. 259-268.
-
(2004)
Proc. of Third International Symposium on Information Processing in Sensor Networks, IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
19
-
-
0041939778
-
-
Proc. of INFOCOM, 30 Mar, 3 Apr
-
S. Pilosof. R. Ramjee, D. Raz, Y. Shavitt, P. Sinha, "Understanding TCP fairness over a wireless LAN," in Proc. of INFOCOM 2003 v. 2, 30 Mar. - 3 Apr. 2003, pp. 863-872.
-
(2003)
Understanding TCP fairness over a wireless LAN
, vol.2
, pp. 863-872
-
-
Pilosof, S.1
Ramjee, R.2
Raz, D.3
Shavitt, Y.4
Sinha, P.5
-
20
-
-
33749044368
-
A bandwidth sharing approach to improve licensed spectrum utilization
-
Nov. 8-11
-
S. Sankaranarayanan, P. Papadimitratos, A. Mishra, S. Hershey, "A bandwidth sharing approach to improve licensed spectrum utilization," in Proc. IEEE DySPAN. Nov. 8-11, 2005, pp. 279-288.
-
(2005)
Proc. IEEE DySPAN
, pp. 279-288
-
-
Sankaranarayanan, S.1
Papadimitratos, P.2
Mishra, A.3
Hershey, S.4
-
21
-
-
0010381933
-
RFC 2828: Internet Security Glossary
-
May
-
R Shirey, "RFC 2828: Internet Security Glossary," IETF, May 2000.
-
(2000)
IETF
-
-
Shirey, R.1
-
24
-
-
0003669025
-
Vulnerability assessment of the transportation infrastructure relying on the Global Positioning System,
-
U.S. Dept. of Trans, Aug. 29
-
J. A. Volpe, "Vulnerability assessment of the transportation infrastructure relying on the Global Positioning System," Final Report for the National Transportation Systems Center, U.S. Dept. of Trans., Aug. 29, 2001 (www.navcen.uscg.gov/gps/geninfo/pressrelease.htm).
-
(2001)
Final Report for the National Transportation Systems Center
-
-
Volpe, J.A.1
-
25
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Illinois
-
X. Wenyuan, T. Wade, Z. Yanyong, W. Timothy, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing, Illinois, 2005, pp. 46-57.
-
(2005)
Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Wenyuan, X.1
Wade, T.2
Yanyong, Z.3
Timothy, W.4
|