-
1
-
-
63249135652
-
Cognitive spectrum and its security issues
-
S. Arkoulis, L. Kazatzopoulos, C. Delakouridis, and G. F. Marias, "Cognitive spectrum and its security issues," in Proc. 2nd International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), 2008.
-
(2008)
Proc. 2nd International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST)
-
-
Arkoulis, S.1
Kazatzopoulos, L.2
Delakouridis, C.3
Marias, G.F.4
-
2
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-armed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: the adversarial multi-armed bandit problem," in Proc. 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS), 1995.
-
(1995)
Proc. 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS)
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
7
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
8
-
-
84889281816
-
Thomas, Elements of Information Theory
-
2nd edition Wiley-Interscience
-
T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd edition. Wiley-Interscience, 2006.
-
(2006)
-
-
Cover, T.M.1
Thomas, J.A.2
-
10
-
-
46649107735
-
Opportunistic spectrum access in fading channels through collaborative sensing
-
Mar.
-
A. Ghasemi and E. S. Sousa, "Opportunistic spectrum access in fading channels through collaborative sensing," Journal Commun., vol. 2, no. 2, pp. 71-82, Mar. 2007.
-
(2007)
Journal Commun
, vol.2
, Issue.2
, pp. 71-82
-
-
Ghasemi, A.1
Sousa, E.S.2
-
17
-
-
34547750388
-
Cooperative spectrum sensing in cognitive radio-part I: Two user networks
-
June
-
G. Ghurumuruhan and Y. (G.) Li, "Cooperative spectrum sensing in cognitive radio-part I: two user networks," IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2204-2213, June 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.6
, pp. 2204-2213
-
-
Ghurumuruhan, G.1
Li, Y.2
-
18
-
-
34547776253
-
Cooperative spectrum sensing in cognitive radio-part II: Multiuser networks
-
June
-
G. Ghurumuruhan and Y. (G.) Li, "Cooperative spectrum sensing in cognitive radio-part II: multiuser networks," IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2214-2222, June 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.6
, pp. 2214-2222
-
-
Ghurumuruhan, G.1
Li, Y.2
-
21
-
-
77955364168
-
Blind dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems with unknown channel statistics
-
submitted to
-
H. Li and Z. Han, "Blind dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems with unknown channel statistics," submitted to IEEE International Conference on Communications (ICC), 2010.
-
(2010)
IEEE International Conference on Communications (ICC)
-
-
Li, H.1
Han, Z.2
-
24
-
-
40949158575
-
Multi-channel jamming attacks using cognitive radios
-
A. Sampath, H. Dai, H. Zheng, and B.Y. Zhao, "Multi-channel jamming attacks using cognitive radios," in Proc. IEEE Conference on Computer Communications and Networks (ICCCN), 2007.
-
(2007)
Proc. IEEE Conference on Computer Communications and Networks (ICCCN)
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.Y.4
-
26
-
-
70349659935
-
Attack-proof collaborative spectrum sensing in cognitive radio networks
-
W. Wang, H. Li, Y. Sun, and Z. Han, "Attack-proof collaborative spectrum sensing in cognitive radio networks," in Proc. Conference on Information Sciences and Systems (CISS), 2009.
-
(2009)
Proc. Conference on Information Sciences and Systems (CISS)
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
27
-
-
77951594186
-
CatchIt: Detect malicious nodes in collaborative spectrum sensing
-
W. Wang, H. Li, Y. Sun, and Z. Han, "CatchIt: detect malicious nodes in collaborative spectrum sensing," in Proc. IEEE Conference on Global Communications (Globecom), 2009.
-
(2009)
Proc. IEEE Conference on Global Communications (Globecom)
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
29
-
-
43849098907
-
A trust based framework for secure data aggregation in wireless sensor networks
-
W. Zhang, S. K. Das, and Y. Liu, "A trust based framework for secure data aggregation in wireless sensor networks," in Proc. IEEE Conference on Sensor, Mesh and Ad hoc Communications and Networks (SECON), 2006.
-
(2006)
Proc. IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Zhang, W.1
Das, S.K.2
Liu, Y.3
|