-
1
-
-
0007890396
-
-
Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden
-
J. Mitola III, "Cognitive radio: an integrated agent architecture for software defined radio," Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2000.
-
(2000)
Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio
-
-
Mitola III, J.1
-
2
-
-
85164892042
-
Game theory for cognitive radio networks: An overview
-
to appear
-
B. Wang, Y. Wu, and K. J. R. Liu, "Game theory for cognitive radio networks: an overview," Computer Networks, to appear.
-
Computer Networks
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
-
3
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
5
-
-
58049113451
-
Hammer model threat assessment of cognitive radio denial of service attacks
-
Oct.
-
A. Sethi and T. X. Brown, "Hammer model threat assessment of cognitive radio denial of service attacks," IEEE DySPAN, Oct. 2008.
-
(2008)
IEEE DySPAN
-
-
Sethi, A.1
Brown, T.X.2
-
6
-
-
77951594186
-
CatchIt: Detect malicious nodes in collaborative spectrum sensing
-
Hawaii, Dec.
-
W. Wang, H. Li, Y. Sun, and Z. Han, "CatchIt: detect malicious nodes in collaborative spectrum sensing," IEEE Globecom, Hawaii, Dec. 2009.
-
(2009)
IEEE Globecom
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
8
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
E. Altman, K. Avrachenkov, and A. Garnaev, "A jamming game in wireless networks with transmission cost," NET-COOP 2007. Lecture Notes in Computer Science, vol. 4465, pp. 1-12, 2007.
-
(2007)
NET-COOP 2007. Lecture Notes in Computer Science
, vol.4465
, pp. 1-12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
9
-
-
70249103556
-
Jamming mitigation in multiradio wireless networks: Reactive or proactive?
-
S. Khattab, D. Mosse, and R. Melhem, "Jamming mitigation in multiradio wireless networks: reactive or proactive?," International Conference on Security and Privacy in Communication Netowrks, Istanbul, Turkey, Sept. 2008.
-
International Conference on Security and Privacy in Communication Netowrks, Istanbul, Turkey, Sept. 2008
-
-
Khattab, S.1
Mosse, D.2
Melhem, R.3
-
11
-
-
77951607794
-
Optimal power allocation strategy against jamming attacks using the Colonel Blotto game
-
Hawaii, Dec.
-
Y. Wu, B. Wang, and K. J. R. Liu, "Optimal power allocation strategy against jamming attacks using the Colonel Blotto game," IEEE Globecom, Hawaii, Dec. 2009.
-
(2009)
IEEE Globecom
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
-
12
-
-
77951585062
-
Dogfight in spectrum: Jamming and anti-jamming in multichannel cognitive radio systems
-
Dec.
-
H. Li and Z. Han, "Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems," IEEE Globecom, Dec. 2009.
-
(2009)
IEEE Globecom
-
-
Li, H.1
Han, Z.2
-
13
-
-
38149031866
-
Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks
-
Jan.
-
H. Su and X. Zhang, "Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118-129, Jan. 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.1
, pp. 118-129
-
-
Su, H.1
Zhang, X.2
|