-
1
-
-
0007890396
-
-
Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden
-
J. Mitola III, "Cognitive radio: An integrated agent architecture for software defined radio," Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2000.
-
(2000)
Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio
-
-
Mitola III, J.1
-
3
-
-
77956266464
-
Game theory for cognitive radio networks: An overview
-
Oct
-
B. Wang, Y. Wu, and K. J. R. Liu, "Game theory for cognitive radio networks: An overview," Computer Networks, vol. 54, no. 14, pp.2537-2561, Oct. 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.14
, pp. 2537-2561
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
-
5
-
-
33749070524
-
The role of game theory in the analysis of software radio networks
-
San Diego, Nov
-
J. Neel, J. Reed, and R. Gilles, "The role of game theory in the analysis of software radio networks," in SDR Forum Technical Conference, San Diego, Nov. 2002.
-
(2002)
SDR Forum Technical Conference
-
-
Neel, J.1
Reed, J.2
Gilles, R.3
-
6
-
-
34247189646
-
Spectrum sharing for unlicensed bands
-
DOI 10.1109/JSAC.2007.070402, 4155367
-
R. Etkin, A. Parekh, and D. Tse, "Spectrum sharing for unlicensed bands," IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517-528, Apr. 2007. (Pubitemid 46620946)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.3
, pp. 517-528
-
-
Etkin, R.1
Parekh, A.2
Tse, D.3
-
7
-
-
67349126192
-
Repeated open spectrum sharing game with cheat-proof strategies
-
Apr
-
Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Repeated open spectrum sharing game with cheat-proof strategies," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1922-1933, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1922-1933
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
Clancy, T.C.4
-
8
-
-
38149105953
-
Multi-stage pricing game for collusion-resistant dynamic spectrum allocation
-
Jan
-
Z. Ji and K. J. R. Liu, "Multi-stage pricing game for collusion-resistant dynamic spectrum allocation," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 182-191, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 182-191
-
-
Ji, Z.1
Liu, K.J.R.2
-
9
-
-
72949090674
-
A scalable collusionresistant multi-winner cognitive spectrum auction game
-
Dec
-
Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "A scalable collusionresistant multi-winner cognitive spectrum auction game," IEEE Trans. Commun., vol. 57, no. 12, pp. 3805-3816, Dec. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.12
, pp. 3805-3816
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
Clancy, T.C.4
-
10
-
-
77955017294
-
Distributed cognitive sensing for time varying channels: Exploration and exploitation
-
Sydney, Australia, Apr
-
S. Gao, L. Qian, D. R. Vaman, and Z. Han, "Distributed cognitive sensing for time varying channels: Exploration and exploitation," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, Apr. 2010.
-
(2010)
Proc. IEEE Wireless Communications and Networking Conference (WCNC)
-
-
Gao, S.1
Qian, L.2
Vaman, D.R.3
Han, Z.4
-
11
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
13
-
-
52549109488
-
Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
-
Oct
-
T. X. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," Mobile Networks and Applications, vol. 13, no. 5, pp. 516-532, Oct. 2008.
-
(2008)
Mobile Networks and Applications
, vol.13
, Issue.5
, pp. 516-532
-
-
Brown, T.X.1
Sethi, A.2
-
14
-
-
77951594186
-
CatchIt: Detect malicious nodes in collaborative spectrum sensing
-
Hawaii, Dec
-
W. Wang, H. Li, Y. Sun, and Z. Han, "CatchIt: Detect malicious nodes in collaborative spectrum sensing," in Proc. IEEE Global Communications Conference (Globecom), Hawaii, Dec. 2009.
-
(2009)
Proc. IEEE Global Communications Conference (Globecom)
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
15
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sept
-
Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks", IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.J.R.2
-
18
-
-
33746832500
-
The Colonel Blotto game
-
DOI 10.1007/s00199-005-0071-5
-
B. Roberson, "The Colonel Blotto game," Economic Theory, vol. 29, no. 1, pp. 1-24, Sept. 2006. (Pubitemid 44180663)
-
(2006)
Economic Theory
, vol.29
, Issue.1
, pp. 1-24
-
-
Roberson, B.1
-
19
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
Network Control and Optimization - First EuroFGI International Conference, NET-COOP 2007, Proceedings
-
E. Altman, K. Avrachenkov, and A. Garnaev, "A jamming game in wireless networks with transmission cost," in Proc. of NET-COOP 2007. Lecture Notes in Computer Science, vol. 4465, pp. 1-12, 2007. (Pubitemid 350259792)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4465 LNCS
, pp. 1-12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
20
-
-
70249103556
-
Jamming mitigation in multiradio wireless networks: Reactive or proactive?
-
Istanbul, Turkey, Sept
-
S. Khattab, D. Mosse, and R. Melhem, "Jamming mitigation in multiradio wireless networks: Reactive or proactive?" in Proc. of International Conference on Security and Privacy in Communication Netowrks (SecureComm 2008), Istanbul, Turkey, Sept. 2008.
-
(2008)
Proc. of International Conference on Security and Privacy in Communication Netowrks (SecureComm 2008)
-
-
Khattab, S.1
Mosse, D.2
Melhem, R.3
-
21
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
Oakland, CA, May
-
M. Strasser, S. Capkun, C. Popper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
(2008)
Proc. IEEE Symposium on Security and Privacy
-
-
Strasser, M.1
Capkun, S.2
Popper, C.3
Cagalj, M.4
-
22
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
Zurich, Switzerland, Mar
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. ACM conference on Wireless network security (WiSec), Zurich, Switzerland, Mar. 2009.
-
(2009)
Proc. ACM Conference on Wireless Network Security (WiSec)
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
23
-
-
79960855950
-
Delay-bounded adaptive UFHbased anti-jamming wireless communication
-
Shanghai, China, Apr
-
Q. Wang, P. Xu, K. Ren,and X.-Y. Li, "Delay-bounded adaptive UFHbased anti-jamming wireless communication", in Proc. IEEE International Conference on Computer Communications (Infocom), Shanghai, China, Apr. 2011.
-
(2011)
Proc. IEEE International Conference on Computer Communications (Infocom)
-
-
Wang, Q.1
Xu, P.2
Renand, K.3
Li, X.-Y.4
-
24
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part I: Known channel statistics
-
Nov
-
H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part I: Known channel statistics," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3566- 3577, Nov. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
25
-
-
78651520951
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part II: Unknown channel statistics
-
Jan
-
H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part II: Unknown channel statistics," IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 274-283, Jan. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.1
, pp. 274-283
-
-
Li, H.1
Han, Z.2
-
26
-
-
40949158575
-
Multi-channel jamming attacks using cognitive radios
-
DOI 10.1109/ICCCN.2007.4317844, 4317844, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007
-
A. Sampath, H. Dai, H. Zheng, and B. Y. Zhao, "Multi-channel jamming attacks using cognitive radios," in Proc. International Conference on Computer Communications and Networks (ICCCN), pp. 352-357, Hawai'i, Aug. 2007. (Pubitemid 351403476)
-
(2007)
Proceedings - International Conference on Computer Communications and Networks, ICCCN
, pp. 352-357
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.Y.4
-
27
-
-
38149031866
-
Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks
-
Jan
-
H. Su and X. Zhang, "Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 118-129, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 118-129
-
-
Su, H.1
Zhang, X.2
-
28
-
-
0035789266
-
Effects of wireless physical layer modeling in mobile ad hoc networks
-
Long Beach, CA, Oct
-
M. Takai, J. Martin, and R, Bagrodia, "Effects of wireless physical layer modeling in mobile ad hoc networks," in Proc. ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), Long Beach, CA, Oct. 2001.
-
(2001)
Proc. ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc)
-
-
Takai, M.1
Martin, J.2
Bagrodia, R.3
|