-
1
-
-
33745648091
-
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
I. F. Akyildiz, W. Lee, M. C. Vuran and S. Mohanty, "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey," Comput. Networks, vol. 50, pp. 2127-2159, 2006.
-
(2006)
Comput. Networks
, vol.50
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.2
Vuran, M.C.3
Mohanty, S.4
-
4
-
-
52549109488
-
-
T. X. Brown and A. Sethi, Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment, accepted in MONET 2008: J. of Mobile Networks and Applications, 2008.
-
T. X. Brown and A. Sethi, "Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment," accepted in MONET 2008: J. of Mobile Networks and Applications, 2008.
-
-
-
-
5
-
-
0038054788
-
-
First ed, Englewood Cliffs, NJ: Prentice-Hall
-
W. Hammer, Handbook of System and Product Safety, First ed., Englewood Cliffs, NJ: Prentice-Hall, 1972, pp. 351.
-
(1972)
Handbook of System and Product Safety
, pp. 351
-
-
Hammer, W.1
-
7
-
-
58049099371
-
-
IEEE 802. 22 Discussion Document 802. 22-08/0159r00, Jun
-
A. Mody, R. Reddy, T. Kiernan and M. Sherman, "Scope, Agenda, Workplan and Threat Definition for the Security Ad-Hoc in 802.22," IEEE 802. 22 Discussion Document 802. 22-08/0159r00, Jun. 2008.
-
(2008)
Scope, Agenda, Workplan and Threat Definition for the Security Ad-Hoc in 802.22
-
-
Mody, A.1
Reddy, R.2
Kiernan, T.3
Sherman, M.4
-
9
-
-
33749065326
-
Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks
-
L. Ma, X. Han and C. -. Shen, "Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks," New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First IEEE International Symposium on, pp. 203-213, 2005.
-
(2005)
New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First IEEE International Symposium on
, pp. 203-213
-
-
Ma, L.1
Han, X.2
Shen, C.3
-
10
-
-
33845653623
-
A bandwidth sharing approach to improve licensed spectrum utilization
-
IEEE, 43pp
-
P. Papadimitratos, S. Sankaranarayanan and A. Mishra, "A bandwidth sharing approach to improve licensed spectrum utilization," Communications Magazine, IEEE, 43pp. supl.10-supl.14, 2005.
-
(2005)
Communications Magazine
, Issue.SUPL.10-14
-
-
Papadimitratos, P.1
Sankaranarayanan, S.2
Mishra, A.3
-
11
-
-
58049126750
-
In matter of unlicensed operation in the TV broadcast bands
-
FCC 06-156, ET Docket No. 04-186, Oct. 12
-
First Report and Order and Further Notice of Proposed Rule Making, In matter of unlicensed operation in the TV broadcast bands, FCC 06-156, ET Docket No. 04-186, (Oct. 12, 2006).
-
(2006)
First Report and Order and Further Notice of Proposed Rule Making
-
-
-
12
-
-
58049104505
-
-
Memorandum Opinion and Order, Additional spectrum for unlicensed devices below 900 MHz and in the 3 GHz band, FCC 07-99, ET Docket No. 02-380, (June 7, 2007).
-
Memorandum Opinion and Order, Additional spectrum for unlicensed devices below 900 MHz and in the 3 GHz band, FCC 07-99, ET Docket No. 02-380, (June 7, 2007).
-
-
-
-
13
-
-
48349122545
-
-
2nd ed, Hoboken, New Jersey, USA: John Wiley & Sons, Inc
-
D. G. Raheja and M. Alloco, Assurance Technologies Principles and Practice, 2nd ed., Hoboken, New Jersey, USA: John Wiley & Sons, Inc., 2006, pp. 449.
-
(2006)
Assurance Technologies Principles and Practice
, pp. 449
-
-
Raheja, D.G.1
Alloco, M.2
-
14
-
-
78049501860
-
-
U. S. Department of Transportation, Dec 30, FAA system safety handbook, Online, Available
-
U. S. Department of Transportation, Federal Aviation Administration. (2000, Dec 30). FAA system safety handbook. [Online]. Available: http://www.faa.gov/library/manuals/aviation/risk_management/ss_handbook/
-
(2000)
Federal Aviation Administration
-
-
-
15
-
-
58049099895
-
-
J. T. Luxhøj, Safety risk analysis of unmanned aircraft system (UAS) integration into the national airspace system (NAS): Phase 1, Office of Aviation Research and Development, Washington, DC, DOT/FAA/(AR)-xx/xx, (Jan, 2008).
-
J. T. Luxhøj, Safety risk analysis of unmanned aircraft system (UAS) integration into the national airspace system (NAS): Phase 1, Office of Aviation Research and Development, Washington, DC, DOT/FAA/(AR)-xx/xx, (Jan, 2008).
-
-
-
-
18
-
-
38149046958
-
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks
-
Jan
-
R. Chen, J. Park and J. H. Reed, "Defense Against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, vol. 26, pp. 25-37, Jan. 2008.
-
(2008)
IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications
, vol.26
, pp. 25-37
-
-
Chen, R.1
Park, J.2
Reed, J.H.3
-
19
-
-
58049127229
-
-
ETSI, Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols over security; part 1: Threat analysis, European Telecommunications Standards Institute, France, ETSI TS 102 165-1 V4.1.1, Feb, 2003
-
ETSI, Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols over security; part 1: Threat analysis, European Telecommunications Standards Institute, France, ETSI TS 102 165-1 V4.1.1, (Feb, 2003).
-
-
-
-
20
-
-
58049093043
-
-
U. S. Department of Transportation, Federal Aviation Administration, Jan, Online, Available
-
U. S. Department of Transportation, Federal Aviation Administration. (2005, Jan). System safety process steps. [Online]. Available: http://www.faa.gov/library/manuals/aviation/risk_management/media/ssprocdscrp. pdf
-
(2005)
System safety process steps
-
-
-
22
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Presented at ACM International Symposium on Mobile Ad Hoc Networking and Computing, Online, Available
-
T. X. Brown, J. E. James and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. Presented at MobiHoc '06: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing. [Online]. Available: http://doi.acm.org/10.1145/1132905.1132919
-
MobiHoc '06: Proceedings of the 7th
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
23
-
-
0003669025
-
Vulnerability assessment of the transportation infrastructure relying on the global positioning system
-
Aug 29, U. S. Department of Transportation. v4.6, Online, Available
-
J. A. Volpe. (2001, Aug 29). Vulnerability assessment of the transportation infrastructure relying on the global positioning system. Office of the Assistant Secretary for Transportation Policy, U. S. Department of Transportation. v4.6, [Online]. Available: http://www.navcen.uscg.gov/archive/ 2001/Oct/FinalReport-v4.6.pdf
-
(2001)
Office of the Assistant Secretary for Transportation Policy
-
-
Volpe, J.A.1
-
24
-
-
48649085453
-
MIMO architecture for wireless communication
-
May, Available
-
I. Hen. (2006, May). MIMO architecture for wireless communication. Intel Technology Journal [Online]. vol. 10, (2), Available: http://developer.intel. com/technology/itj/2006/volume10issue02/art07_MIMO_Architecture/p01_abstract.htm
-
(2006)
Intel Technology Journal [Online]
, vol.10
, Issue.2
-
-
Hen, I.1
|