-
1
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug.
-
J. III Mitola and G. Q. Jr. Maguire, "Cognitive radio: making software radios more personal," Personal Communications, IEEE, Volume 6, Issue 4, Page(s):13-18, Aug. 1999.
-
(1999)
Personal Communications, IEEE
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola III, J.1
Maguire Jr., G.Q.2
-
2
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
Feb.
-
S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Select. Areas in Commun., vol. 23, no. 2, Page(s): 201-220, Feb. 2005.
-
(2005)
IEEE J. Select. Areas in Commun.
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
3
-
-
84858157011
-
-
in print, Cambridge University Press, UK
-
E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access in Cognitive Radio Networks, in print, Cambridge University Press, UK, 2009.
-
(2009)
Dynamic Spectrum Access in Cognitive Radio Networks
-
-
Hossain, E.1
Niyato, D.2
Han, Z.3
-
4
-
-
84924437865
-
-
Cambridge University Press, UK, April
-
Z. Han and K. J. R. Liu, Resource Allocation for Wireless Networks: Basics, Techniques, and Applications, Cambridge University Press, UK, April, 2008.
-
(2008)
Resource Allocation for Wireless Networks: Basics, Techniques, and Applications
-
-
Han, Z.1
Liu, K.J.R.2
-
5
-
-
38149046958
-
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
-
Jan.
-
R. Chen, J.-M. Park, and J. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Select. Areas Commun., vol. 26, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Select. Areas Commun.
, vol.26
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.3
-
7
-
-
42549125692
-
Cooperative sensing among cognitive radios
-
Jun.
-
S. M. Mishra, A. Sahai, and R. W. Brodersen, "Cooperative sensing among cognitive radios," in Proc. of IEEE Int. Conf. Commun. (ICC), Turkey, vol. 4, pp. 1658-1663, Jun. 2006.
-
(2006)
Proc. of IEEE Int. Conf. Commun. (ICC), Turkey
, vol.4
, pp. 1658-1663
-
-
Mishra, S.M.1
Sahai, A.2
Brodersen, R.W.3
-
9
-
-
70349659935
-
Attack-proof collaborative spectrum sensing in cognitive radio systems
-
the Johns Hopkins University, Baltimore, MD, March 18-20
-
W. Wang, H. Li, Y. Sun and Z. Han, "Attack-proof collaborative spectrum sensing in cognitive radio systems," in Proc. of Conference on Information Sciences and Systems (CISS), the Johns Hopkins University, Baltimore, MD, March 18-20, 2009.
-
(2009)
Proc. of Conference on Information Sciences and Systems (CISS)
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
12
-
-
77955400839
-
Fictitious play with imperfect observations for network intrusion detection
-
Preprints of the
-
K. C. Nguyen, T. Alpcan, and T. Başar. "Fictitious play with imperfect observations for network intrusion detection". Preprints of the 13th Intl. Symp. Dynamic Games and Applications (ISDGA 2008), June 30-July 3, 2008; Wroclaw, Poland.
-
13th Intl. Symp. Dynamic Games and Applications (ISDGA 2008), June 30-July 3, 2008; Wroclaw, Poland
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
15
-
-
70449403415
-
Robust and scalable trust management for collaborative intrusion detection
-
C. Fung, J. Zhang, I. Aib, and R. Boutaba, Robust and scalable trust management for collaborative intrusion detection, in Proc. of11th IFIP/IEEE International Symposium on Integrated Network Management (IM09), 2009.
-
(2009)
Proc. Of11th IFIP/IEEE International Symposium on Integrated Network Management (IM09)
-
-
Fung, C.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
17
-
-
77955377818
-
Dynamic IDS configuration
-
Q. Zhu and T. Başar, "Dynamic IDS configuration," in Proc. of Conference on Decision and Control (CDC), Shanghai, P.R. China, December 16-18, 2009.
-
Proc. of Conference on Decision and Control (CDC), Shanghai, P.R. China, December 16-18, 2009
-
-
Zhu, Q.1
Başar, T.2
-
18
-
-
77955362944
-
A Game-Theoretical Approach to Incentive Design in Collaborative IDS Networks
-
Q. Zhu, C. Fung, R. Boutaba and T. Başar, "A Game-Theoretical Approach to Incentive Design in Collaborative IDS Networks, " in Proceedings of GameNets, Istanbul, Turkey, May 13-15, 2009.
-
Proceedings of GameNets, Istanbul, Turkey, May 13-15, 2009
-
-
Zhu, Q.1
Fung, C.2
Boutaba, R.3
Başar, T.4
-
19
-
-
77955366202
-
Security Investment Games of Interdependent Organizations
-
R. Miura-Ki and N. Bambos and J. Mitchell , Security Investment Games of Interdependent Organizations, Proceedings of The Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, Sept 23-26, 2008.
-
Proceedings of the Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, Sept 23-26, 2008
-
-
Miura-Ki, R.1
Bambos, N.2
Mitchell, J.3
-
21
-
-
0001402950
-
An Iterative Method of Solving a Game
-
Sept.
-
J. Robinson, "An Iterative Method of Solving a Game," Annals of Mathematics, 54(2):296-301, Sept. 1951.
-
(1951)
Annals of Mathematics
, vol.54
, Issue.2
, pp. 296-301
-
-
Robinson, J.1
-
22
-
-
3843059082
-
Unified Convergence Proofs of Continuous-Time Fictitious Play
-
July
-
J. S. Shamma and G. Arslan, "Unified Convergence Proofs of Continuous-Time Fictitious Play," IEEE Trans Automatic Control, 49(7):1137-1142, July 2004
-
(2004)
IEEE Trans Automatic Control
, vol.49
, Issue.7
, pp. 1137-1142
-
-
Shamma, J.S.1
Arslan, G.2
|