-
2
-
-
77951850343
-
-
Federal Communications Commission. Facilitating the provision of spectrum-based services to rural areas and promoting opportunities for rural telephone companies to provide spectrum-based services. September
-
Federal Communications Commission. Facilitating the provision of spectrum-based services to rural areas and promoting opportunities for rural telephone companies to provide spectrum-based services. FCC 04-166. WT Docket No. 02-381, September 2004.
-
(2004)
FCC 04-166. WT Docket No. 02-381
-
-
-
3
-
-
77951813326
-
-
National Telecommunications and Information Administration (NTIA). Comments to FCC 03-322 ET Docket No. 03-108, February Available from
-
National Telecommunications and Information Administration (NTIA). Comments to FCC 03-322 ET Docket No. 03-108, February 2005. Available from: http://www.ntia.doc.gov/ntiahome/fccfilings/2005/cogradio/ETDocket03- 10802152005.htm.
-
(2005)
-
-
-
4
-
-
84889278688
-
-
Preface. Mahmoud (University of Guelph C (ed.)), Wiley: New York
-
Qusay H. Preface. Mahmoud (University of Guelph C (ed.)), COGNITIVE NETWORKS: Towards Self-Aware Networks. Wiley: New York, 2007; 24.
-
(2007)
COGNITIVE NETWORKS: Towards Self-Aware Networks
, pp. 24
-
-
Qusay, H.1
-
6
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
Akyildiz IF, Lee WY, Vuran MC, Mohanty S. Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 2006; 50(13):2127-2159. DOI: http://dx.doi.org/10.1016/ j.comnet.2006.05.001.
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.Y.2
Vuran, M.C.3
Mohanty, S.4
-
7
-
-
77951781930
-
Towards autonomic security in beyond 3g infrastructures
-
December Available from
-
Lacoste M, Saxena A, Jarboui T, LÜcking U, Steinke B, Pulou J, Polakovic J, Buljore S. Towards autonomic security in beyond 3g infrastructures. E2R II White Paper, December 2007. Available from: https://www.icte3.eu/ project/whitepapers/e2r/10.E2RIIAutonomicSecurityWhitePaper.pdf.
-
(2007)
E2R II White Paper
-
-
Lacoste, M.1
Saxena, A.2
Jarboui, T.3
LÜcking, U.4
Steinke, B.5
Pulou, J.6
Polakovic, J.7
Buljore, S.8
-
9
-
-
34548785686
-
A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation
-
DOI 10.1109/DYSPAN.2007.14, 4221476, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
Perez-Romero J, Sallent O, Agusti R, Giupponi L. A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation. Second IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2007, 2007; 46-54. DOI: 10.1109/DYSPAN.2007.14. (Pubitemid 47431634)
-
(2007)
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 46-54
-
-
Perez-Romero, J.1
Sallent, O.2
Agusti, R.3
Giupponi, L.4
-
10
-
-
79956087176
-
IEEE 802.22: An introduction to the first wireless standard based on cognitive radios
-
Cordeiro C, Challapali K, Birru D, Shankar NS. IEEE 802.22: an introduction to the first wireless standard based on cognitive radios. Journal of Communications 2006; 1(1):38-47.
-
(2006)
Journal of Communications
, vol.1
, Issue.1
, pp. 38-47
-
-
Cordeiro, C.1
Challapali, K.2
Birru, D.3
Shankar, N.S.4
-
11
-
-
50249123492
-
Dimsumnet: New directions in wireless networking using coordinated dynamic spectrum
-
DOI: 10.1109/WOWMOM.2005.36
-
Buddhikot M, Kolodzy P, Miller S, Ryan K, Evans J. Dimsumnet: new directions in wireless networking using coordinated dynamic spectrum. Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), 2005; 78-85. DOI: 10.1109/WOWMOM.2005.36.
-
(2005)
Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM)
, pp. 78-85
-
-
Buddhikot, M.1
Kolodzy, P.2
Miller, S.3
Ryan, K.4
Evans, J.5
-
12
-
-
34548767777
-
Knows: Cognitive radio networks over white spaces
-
DOI 10.1109/DYSPAN.2007.61, 4221523, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
Yuan Y, Bahl P, Chandra R, Chou P, Ferrell J, Moscibroda T, Narlanka S, Wu Y. Knows: cognitive radio networks over white spaces. Second IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. DySPAN 2007, April 2007; 416-427. DOI: 10.1109/DYSPAN.2007.61. (Pubitemid 47431679)
-
(2007)
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 416-427
-
-
Yuan, Y.1
Bahl, P.2
Chandra, R.3
Chou, P.A.4
Ferrell, J.I.5
Moscibroda, T.6
Narlanka, S.7
Wu, Y.8
-
13
-
-
77951849778
-
CORVUS: A cognitive radio approach for usage of virtual unlicensed spectrum
-
Available from
-
Mishra SM. CORVUS: A cognitive radio approach for usage of virtual unlicensed spectrum. Berleley MCMA White Paper, 2004. Available from: http://bwrc.eecs.berkeley.edu/Research/MCMA/CRWhitepaperfinal1.pdf.
-
(2004)
Berleley MCMA White Paper
-
-
Mishra, S.M.1
-
14
-
-
33749049332
-
DSAP: A protocol for coordinated spectrum access
-
DOI 10.1109/DYSPAN.2005.1542680, 1542680, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
-
Brik V, Rozner E, Banerjee S, Bahl P. Dsap: a protocol for coordinated spectrum access. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005; 611-614.DOI: 10.1109/DYSPAN.2005. 1542680. (Pubitemid 44462564)
-
(2005)
2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
, pp. 611-614
-
-
Brik, V.1
Rozner, E.2
Banerjee, S.3
Bahl, P.4
-
15
-
-
85008048349
-
IEEE 802.22: The first cognitive radio wireless regional area network standard
-
IEEE DOI: 10.1109/MCOM.2009.4752688
-
Stevenson C, Chouinard G, Lei Z, Hu W, Shellhammer S, Caldwell W. IEEE 802.22: the first cognitive radio wireless regional area network standard. Communications Magazine, IEEE 2009; 47(1):130-138. DOI: 10.1109/MCOM.2009. 4752688.
-
(2009)
Communications Magazine
, vol.47
, Issue.1
, pp. 130-138
-
-
Stevenson, C.1
Chouinard, G.2
Lei, Z.3
Hu, W.4
Shellhammer, S.5
Caldwell, W.6
-
17
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI: 10.1016/S1570-8705(03)00008-8. Sensor Network Protocols and Applications
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1(2-3):293-315. DOI: 10.1016/S1570-8705(03)00008-8. Sensor Network Protocols and Applications.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
DOI: 10.1109/JSAC.2008.080104
-
Chen R, Park JM, Reed J. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications 2008; 26(1):25-37. DOI: 10.1109/JSAC.2008.080104. Copyright © 2010 John Wiley & Sons, Ltd. Int. J. Commun. Syst. 2010; 23:633-652
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.M.2
Reed, J.3
-
19
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
ACM: New York, NY, U.S.A., DOI: http://doi.acm.org/10.1145/1023720. 1023741
-
Aad I, Hubaux JP, Knightly EW. Denial of service resilience in ad hoc networks. MobiCom '04: Proceedings o f the 10th Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, U.S.A., 2004; 202-215. DOI: http://doi.acm.org/10.1145/1023720.1023741.
-
(2004)
MobiCom '04: Proceedings o f the 10th Annual International Conference on Mobile Computing and Networking
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.P.2
Knightly, E.W.3
-
25
-
-
21644436295
-
Implementation issues in spectrum sensing for cognitive radios
-
DOI: 10.1109/ACSSC.2004.1399240
-
Cabric D, Mishra S, Brodersen R. Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, 2004; 772-776. DOI: 10.1109/ACSSC.2004.1399240.
-
(2004)
Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers
, vol.1
, pp. 772-776
-
-
Cabric, D.1
Mishra, S.2
Brodersen, R.3
-
27
-
-
77951857813
-
-
Recommended text for security in 802.22. 802.22 WG on WRANs-doc.: IEEE 802.22-08/0174r18. Available at:, May
-
Mody A, Reddy R, Kiernan T. Recommended text for security in 802.22. 802.22 WG on WRANs-doc.: IEEE 802.22-08/0174r18. Available at: https://mentor.ieee.org/802.22/dcn/08/22-08-0174-18-0000-recommendedtext-for- section-7-on-security-in-802-22.doc, May 2009.
-
(2009)
-
-
Mody, A.1
Reddy, R.2
Kiernan, T.3
-
29
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
ACM: New York, NY, U.S.A., DOI: http://doi.acm.org/10.1145/345910.345958
-
Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. MobiCom '00: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, U.S.A., 2000; 275-283. DOI: http://doi.acm.org/10.1145/345910.345958.
-
(2000)
MobiCom '00: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
30
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
IEEE DOI: 10.1109/MWC.2004.1269717
-
Mishra A, Nadkarni K, Patcha A. Intrusion detection in wireless ad hoc networks. Wireless Communications, IEEE 2004; 11(1):48-60. DOI: 10.1109/MWC.2004.1269717.
-
(2004)
Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
31
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15(1):33-51.
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
32
-
-
77951806475
-
-
Federal Communications Commission. Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies. December
-
Federal Communications Commission. Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies. FCC 03-322. ET Docket No. 03-108, December 2003.
-
(2003)
FCC 03-322. ET Docket No. 03-108
-
-
-
33
-
-
34249822230
-
Wireless security through RF fingerprinting
-
DOI 10.1109/CJECE.2007.364330
-
Ureten O, Serinken N. Wireless security through rf fingerprinting. Electrical and Computer Engineering, Canadian Journal of Winter 2007; 32(1):27-33. DOI: 10.1109/CJECE.2007.364330. (Pubitemid 46852763)
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
35
-
-
57849143358
-
Passive steady state rf fingerprinting: A cognitive technique for scalable deployment of co-channel femto cell underlays
-
DySPAN 2008, October 2008; DOI: 10.1109/DYSPAN.2008.46
-
Kennedy I, Scanlon P, Buddhikot M. Passive steady state rf fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. Third IEEE Symposium on the New Frontiers in Dynamic Spectrum Access Networks, 2008, DySPAN 2008, October 2008; 1-12. DOI: 10.1109/DYSPAN.2008.46.
-
(2008)
Third IEEE Symposium on the New Frontiers in Dynamic Spectrum Access Networks
, pp. 1-12
-
-
Kennedy, I.1
Scanlon, P.2
Buddhikot, M.3
-
36
-
-
0033131438
-
Integrated approach for fault tolerance and digital signature in rsa
-
DOI: 10.1049/ip-cdt:19990217
-
Zhang C. Integrated approach for fault tolerance and digital signature in rsa. Computers and Digital Techniques, IEE Proceedings 1999; 146(3):151-159. DOI: 10.1049/ip-cdt:19990217.
-
(1999)
Computers and Digital Techniques, IEE Proceedings
, vol.146
, Issue.3
, pp. 151-159
-
-
Zhang, C.1
-
37
-
-
84892617033
-
A survey of tcp over ad hoc networks
-
Al Hanbali A, Altman E, Nain P. A survey of tcp over ad hoc networks. Communications Surveys and Tutorials, IEEE Quarter 2005; 7(3):22-36.
-
(2005)
Communications Surveys and Tutorials, IEEE Quarter
, vol.7
, Issue.3
, pp. 22-36
-
-
Al Hanbali, A.1
Altman, E.2
Nain, P.3
-
38
-
-
0033885761
-
Freeze-TCP: A true end-to-end TCP enhancement mechanism for mobile environments
-
DOI: 10.1109/INFCOM.2000.832552
-
Goff T, Moronski J, Phatak D, Gupta V. Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments. INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies vol. 3, 2000; 1537-1545. DOI: 10.1109/INFCOM.2000.832552.
-
(2000)
INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1537-1545
-
-
Goff, T.1
Moronski, J.2
Phatak, D.3
Gupta, V.4
-
39
-
-
0003259063
-
Key management for multicast: Issues and architectures
-
National Security Agency, June
-
Wallner D, Harder E, Agee R. Key management for multicast: issues and architectures. National Security Agency, Network Working Group-RFC 2627, June 1999.
-
(1999)
Network Working Group-RFC 2627
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
41
-
-
27644497750
-
Policy-based management of networked computing systems
-
DOI 10.1109/MCOM.2005.1522127
-
Agrawal D, Lee KW, Lobo J. Policy-based management of networked computing systems. Communications Magazine, IEEE 2005; 43(10):69-75. (Pubitemid 41556211)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.10
, pp. 69-75
-
-
Agrawal, D.1
Lee, K.-W.2
Lobo, J.3
|