-
1
-
-
84892987071
-
The software radio"
-
Digital Object Identifier10.1109/NTC
-
J Mitola, "The Software Radio," IEEE National Telesystems Conference,1992-Digital Object Identifier10.1109/NTC.1992.267870.
-
(1992)
IEEE National Telesystems Conference
, vol.1992
, pp. 267870
-
-
Mitola, J.1
-
3
-
-
84893586396
-
-
Last accessed12/04/2010
-
Wireless Innovation Forum. http://www.wirelessinnovation.org. Last accessed12/04/2010.
-
Wireless Innovation Forum
-
-
-
4
-
-
70350324202
-
Understanding the software communications architecture
-
September
-
C.R. Aguayo Gonzalez, C.B. Dietrich, and J.H. Reed, "Understanding the software communications architecture," IEEE Commun. Mag., vol.47, no.9, pp.50-57, September2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.9
, pp. 50-57
-
-
Aguayo Gonzalez, C.R.1
Dietrich, C.B.2
Reed, J.H.3
-
6
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey"
-
15 September
-
I. F. Akyildiz, Won-Yeol Lee, M. C. Vuran, and S. Mohanty, "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey", Computer Networks, Volume 50, Issue13,15 September2006, Pages2127-2159.
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.-Y.2
Vuran, M.C.3
Mohanty, S.4
-
7
-
-
77956371563
-
Etsi reconfigurable radio systems: Status and future directions on software defined radio and cognitive radio standards
-
Sept
-
M. Mueck, A. Piipponen, K. Kalliojarvi, G. Dimitrakopoulos, K. Tsagkaris, P. Demestichas, F. Casadevall, J. Perez-Romero, O. Sallent, G. Baldini, S. Filin, H. Harada, M. Debbah, T. Haustein, J. Gebert, B. Deschamps, P. Bender, M. Street, S. Kandeepan, J. Lota, and A. Hayar, "ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards," IEEE Commun. Mag., vol.48, no.9, pp.78-86, Sept.2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 78-86
-
-
Mueck, M.1
Piipponen, A.2
Kalliojarvi, K.3
Dimitrakopoulos, G.4
Tsagkaris, K.5
Demestichas, P.6
Casadevall, F.7
Perez-Romero, J.8
Sallent, O.9
Baldini, G.10
Filin, S.11
Harada, H.12
Debbah, M.13
Haustein, T.14
Gebert, J.15
Deschamps, B.16
Bender, P.17
Street, M.18
Kandeepan, S.19
Lota, J.20
Hayar, A.21
more..
-
8
-
-
80052058753
-
A comparison between the centralized and distributed approaches for spectrum management
-
G. Salami, O. Durowoju, A. Attar, O. Holland, R. Tafazolli, and H. Aghvami, "A Comparison Between the Centralized and Distributed Approaches for Spectrum Management," IEEE Commun. Surveys Tutorials, vol.PP, no.99, pp.1-17, 0
-
IEEE Commun. Surveys Tutorials
, vol.0
, Issue.99
, pp. 1-17
-
-
Salami, G.1
Durowoju, O.2
Attar, A.3
Holland, O.4
Tafazolli, R.5
Aghvami, H.6
-
9
-
-
84861331259
-
-
Web-site: Last accessed4 December2010)
-
NSA's IA Definition, Web-site: http://www.nsa.gov/ia/. Last accessed4 December2010).
-
NSA's IA Definition
-
-
-
10
-
-
84861335236
-
-
International Telecommunication Union. Security in Telecommunications and Information Technology. An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications
-
International Telecommunication Union. Security in Telecommunications and Information Technology. An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications.
-
-
-
-
11
-
-
84861329056
-
-
Telecommunication networks security requirements
-
ITU-T E.408. Telecommunication networks security requirements.
-
ITU-T E.408
-
-
-
13
-
-
64149083237
-
Open architecture standard for nasa's software-defined space telecommunications radio systems
-
Oct
-
R.C.Reinhart, S.K. Johnson, T.J. Kacpura, C.S. Hall, C.R. Smith, and J. Liebetreu, "Open Architecture Standard for NASA's Software-Defined Space Telecommunications Radio Systems," Proc. IEEE, vol.95, no.10, pp.1986-1993, Oct.2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.10
, pp. 1986-1993
-
-
Reinhart, R.C.1
Johnson, S.K.2
Kacpura, T.J.3
Hall, C.S.4
Smith, C.R.5
Liebetreu, J.6
-
14
-
-
84945986485
-
System threat analysis for high assurance software defined radios", in
-
SDR Forum, Phoenix, AZ November
-
D. Murotake and A. Martin, "System threat analysis for high assurance software defined radios", in Proceedings, SDR'04 Technical Conference, SDR Forum, Phoenix, AZ, November2004.
-
(2004)
Proceedings, SDR'04 Technical Conference
-
-
Murotake, D.1
Martin, A.2
-
15
-
-
70350323626
-
Security, privacy, and accountability in wireless access networks
-
Aug
-
L. Wenjing and R. Kui, "Security, privacy, and accountability in wireless access networks," IEEE Wireless Commun., vol.16, no.4, pp.80-87, Aug.2009.
-
(2009)
IEEE Wireless Commun.
, vol.16
, Issue.4
, pp. 80-87
-
-
Wenjing, L.1
Kui, R.2
-
16
-
-
60449120378
-
Engineering privacy
-
Jan.-Feb
-
S. Spiekermann and L.F. Cranor, "Engineering Privacy," IEEE Trans. Softw. Eng., vol.35, no.1, pp.67-82, Jan.-Feb.2009.
-
(2009)
IEEE Trans. Softw. Eng.
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.F.2
-
17
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
DOI 10.1109/49.232291
-
M. J. Beller, L. Cheng and Y. Yacobi, "Privacy and Authentication on a Portable Communication System", IEEE J. Sel. Areas Commun., Vol.11, No.6, pp.821-829, Aug.1993. (Pubitemid 23712305)
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller Michael, J.1
Chang Li-Fung2
Yacobi Yacov3
-
18
-
-
20444491197
-
Threat analysis of gnu software radio
-
May Palo Alto, CA, USA
-
R. Hill, S. Myagmar, and R. Campbell, "Threat analysis of GNU software radio," in Proc. World Wireless Congress, May2005, Palo Alto, CA, USA.
-
(2005)
Proc. World Wireless Congress
-
-
Hill, R.1
Myagmar, S.2
Campbell, R.3
-
19
-
-
84861335233
-
Software defined radio: Challenges and opportunities
-
T. Ulversoy, "Software Defined Radio: Challenges and Opportunities," IEEE Commun. Surveys Tutorials, no.99, pp.1-20.
-
IEEE Commun. Surveys Tutorials
, Issue.99
, pp. 1-20
-
-
Ulversoy, T.1
-
20
-
-
0036646444
-
A framework for secure download for software-defined radio."
-
July
-
L. B. Michael, M. J. Mihaljevic, S. Haruyama, and R. Kohno, "A framework for secure download for software-defined radio.", IEEE Commun. Mag., July2002.
-
(2002)
IEEE Commun. Mag.
-
-
Michael, L.B.1
Mihaljevic, M.J.2
Haruyama, S.3
Kohno, R.4
-
21
-
-
79955492762
-
Secure download system based on software defined radio composed of fpgas.", in
-
15-18 Sept.2002, Lisbon, Portugal
-
H. Uchikawa, K. Umebayashi, and R. Kohn, "Secure download system based on software defined radio composed of FPGAs.", in Proc. IEEE International Symposiumon Personal, Indoor and Mobile Radio Communications, (PIMRC2002), vol.1, no., pp.437-441,15-18 Sept.2002, Lisbon, Portugal.
-
Proc. IEEE International Symposiumon Personal, Indoor and Mobile Radio Communications, (PIMRC2002
, vol.1
, pp. 437-441
-
-
Uchikawa, H.1
Umebayashi, K.2
Kohn, R.3
-
22
-
-
0842332183
-
Acu and rsm based radio spectrum management for realization of flexible software defined radio"
-
K. Sakaguchi C. Fung Lam, T. Dzung, D. Munkhtur Togooch, J. Takada, and K. Araki, "ACU and RSM Based Radio Spectrum Management for Realization of Flexible Software Defined Radio". IEICE Trans. Communications, Vol. E86-B, No.12, pp.3417-3424.
-
IEICE Trans. Communications
, vol.E86-B
, Issue.12
, pp. 3417-3424
-
-
Sakaguchi, K.1
Fung Lam, C.2
Dzung, T.3
Munkhtur Togooch, D.4
Takada, J.5
Araki, K.6
-
23
-
-
24144478503
-
An anti-cloning framework for software defined radio mobile devices
-
WN24-2, ICC 2005 - 2005 IEEE International Conference on Communications
-
A. Brawerman and J.A. Copeland, "An anti-cloning framework for software defined radio mobile devices," in Proc. IEEE International Conference on Communications (ICC'05), vol.5, no., pp.3434-3438,16-20 May2005, Seoul, Korea. (Pubitemid 41240891)
-
(2005)
IEEE International Conference on Communications
, vol.5
, pp. 3434-3438
-
-
Brawerman, A.1
Copeland, J.A.2
-
24
-
-
70350055213
-
An architecture for secure software defined radio
-
DATE '09. ,20-24 April2009, Nice, France
-
L. Chunxiao, A. Raghunathan, and N.K. Jha, "An architecture for secure software defined radio," in Design, Automation & Test in Europe Conference & Exhibition,2009. DATE '09. , vol., no., pp.448-453,20-24 April2009, Nice, France.
-
(2009)
Design, Automation & Test in Europe Conference & Exhibition
, pp. 448-453
-
-
Chunxiao, L.1
Raghunathan, A.2
Jha, N.K.3
-
25
-
-
81055157666
-
Denial of service attacks in wireless networks: The case of jammers
-
K. Pelechrinis, M. Iliofotou, and V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The Case of Jammers," IEEE Commun. Surveys Tutorials, vol.PP, no.99, pp.1-13, 0
-
IEEE Commun. Surveys Tutorials
, vol.0
, Issue.99 PP
, pp. 1-13
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, V.3
-
26
-
-
58049113451
-
Hammer model threat assessment of cognitive radio denial of service attacks
-
14-17 Oct. Chicago, IL, USA
-
A. Sethi, and T.X. Brown, "Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks," in3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08), vol., no., pp.1-12,14-17 Oct.2008, Chicago, IL, USA.
-
(2008)
3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08)
, pp. 1-12
-
-
Sethi, A.1
Brown, T.X.2
-
27
-
-
56349100322
-
Security threats in cognitive radio networks
-
25-27 Sept. Dalian, China2008
-
Y. Zhang, X. Gaochao, and G. Xiaozhong, "Security Threats in Cognitive Radio Networks," in10th IEEE International Conference on High Performance Computing and Communications (HPCC '08), vol., no., pp.1036-1041,25-27 Sept.2008, Dalian, China2008.
-
(2008)
10th IEEE International Conference on High Performance Computing and Communications (HPCC '08)
, pp. 1036-1041
-
-
Zhang, Y.1
Gaochao, X.2
Xiaozhong, G.3
-
28
-
-
63249135652
-
Cognitive spectrum and its security issues
-
16-19 Sept. Cardiff, UK
-
S. Arkoulis, L. Kazatzopoulos, C. Delakouridis, and G.F. Marias, "Cognitive Spectrum and Its Security Issues," in The Second International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST '08)., vol., no., pp.565-570,16-19 Sept.2008, Cardiff, UK.
-
(2008)
The Second International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST '08)
, pp. 565-570
-
-
Arkoulis, S.1
Kazatzopoulos, L.2
Delakouridis, C.3
Marias, G.F.4
-
29
-
-
51749122004
-
Security in cognitive radio networks: The required evolution in approaches to wireless network security
-
15-17 May2008, Singapore
-
J.L. Burbank, "Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security," in Proc.3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM2008), vol., no., pp.1-7,15-17 May2008, Singapore.
-
Proc.3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM2008
, pp. 17
-
-
Burbank, J.L.1
-
30
-
-
51349141382
-
Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment
-
1-3 Aug.2007, Orlando, Florida
-
T. X Brown and A. Sethi, "Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment," in Proc.2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM2007), vol., no., pp.456-464,1-3 Aug.2007, Orlando, Florida
-
(2007)
Proc.2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM
, pp. 456-464
-
-
Brown, T.X.1
Sethi, A.2
-
31
-
-
40949158575
-
Multi-channel jamming attacks using cognitive radios
-
13-16 Aug.2007, Honolulu, Hawaii, USA
-
A. Sampath, H. Dai, H. Zheng, and B.Y. Zhao, "Multi-channel Jamming Attacks using Cognitive Radios," in Proc. of16th International Conference on Computer Communications and Networks,2007 (ICCCN2007), vol., no., pp.352-357,13-16 Aug.2007, Honolulu, Hawaii, USA.
-
Proc. of16th International Conference on Computer Communications and Networks,2007 (ICCCN2007
, pp. 352-357
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.Y.4
-
32
-
-
78650759662
-
A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming
-
16-19 Nov.2008, San Diego, CA, USA
-
J.L. Burbank, A.R. Hammons, and S.D. Jones, "A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming," in Military Communications Conference,2008. (MILCOM2008), vol., no., pp.1-7,16-19 Nov.2008, San Diego, CA, USA.
-
Military Communications Conference,2008. (MILCOM2008), vol., no
, pp. 17
-
-
Burbank, J.L.1
Hammons, A.R.2
Jones, S.D.3
-
33
-
-
70349659935
-
Attack-proof collaborative spectrum sensing in cognitive radio networks
-
18-20 March2009, Baltimore, MD, USA
-
W. Wenkai, L. Husheng, S. Yan, and H. Zhu, "Attack-proof collaborative spectrum sensing in cognitive radio networks," in43rd Annual Conference on Information Sciences and Systems (CISS2009), vol., no., pp.130-134,18-20 March2009, Baltimore, MD, USA.
-
43rd Annual Conference on Information Sciences and Systems (CISS2009), vol., no
, pp. 130-134
-
-
Wenkai, W.1
Husheng, L.2
Yan, S.3
Zhu, H.4
-
34
-
-
42649135628
-
Toward secure distributed spectrum sensing in cognitive radio networks
-
DOI 10.1109/MCOM.2008.4481340
-
R. Chen; Jung-Min PlacePark; Y.T. Hou, and J.H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Commun. Mag., vol.46, no.4, pp.50-55, April2008. (Pubitemid 351593407)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 50-55
-
-
Chen, R.1
Park, J.-M.2
Hou, Y.T.3
Reed, J.H.4
-
35
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan
-
R. Chen, J.M. Park, and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Sel. Areas Commun., vol.26, no.1, pp.25-37, Jan.2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.M.2
Reed, J.H.3
-
36
-
-
70449393275
-
Security threats to signal classifiers using self-organizing maps
-
22-24 June2009, Hannover, Germany
-
T.C. Clancy and K A. Hawar, "Security threats to signal classifiers using self-organizing maps," in4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications,2009 (CROWNCOM2009), vol., no., pp.1-6,22-24 June2009, Hannover, Germany.
-
4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications,2009 (CROWNCOM2009), vol., no
, pp. 16
-
-
Clancy, T.C.1
Hawar K, A.2
-
37
-
-
57849167516
-
An analytical model for primary user emulation attacks in cognitive radio networks
-
14-17 Oct. Chicago, IL, USA
-
S. Anand, Z. Jin andd K.P. Subbalakshmi, "An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks," in3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08), vol., no., pp.1-6,14-17 Oct.2008, Chicago, IL, USA.
-
(2008)
3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'08), vol., no.
, pp. 16
-
-
Anand, S.1
Jinandd, Z.2
Subbalakshmi, K.P.3
-
38
-
-
77951594186
-
Catchit: Detect malicious nodes in collaborative spectrum sensing
-
Nov.302009-Dec.4,2009, Honolulu, Hawaii, USA
-
W. Wang; H. Li; Y. Sun and Z. Han, "CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing," in IEEE Global Telecommunications Conference (GLOBECOM2009), vol., no., pp.1-6, Nov.302009-Dec.4,2009, Honolulu, Hawaii, USA.
-
IEEE Global Telecommunications Conference (GLOBECOM2009), vol., no
, pp. 16
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
39
-
-
84855713795
-
Robust distributed spectrum sensing in cognitive radio networks
-
13-18 April2008, Phoenix, AZ, USA
-
R. Chen, J, M, Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," in. The27th IEEE Conference on Computer Communications (INFOCOM2008), vol., no., pp.1876-1884,13-18 April2008, Phoenix, AZ, USA.
-
The27th IEEE Conference on Computer Communications (INFOCOM2008), vol., no
, pp. 1876-1884
-
-
Chen, R.1
Park, J.M.2
Bian, K.3
-
40
-
-
77951428329
-
Secure cooperative spectrum sensing for cognitive radio networks
-
18-21 Oct.2009, Boston, MA, USA
-
F. Hu, S. Wang and Z. Cheng, "Secure cooperative spectrum sensing for Cognitive Radio networks," in IEEE Military Communications Conference (MILCOM2009), vol., no., pp.1-7,18-21 Oct.2009, Boston, MA, USA.
-
IEEE Military Communications Conference (MILCOM2009), vol., no
, pp. 17
-
-
Hu, F.1
Wang, S.2
Cheng, Z.3
-
41
-
-
70349664565
-
Common control channel security framework for cognitive radio networks
-
Spring26-29 April2009, Barcelona, Spain
-
G.A. Safdar and M. O'Neill, "Common Control Channel Security Framework for Cognitive Radio Networks," in69th IEEE Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
-
(2009)
69th IEEE Vehicular Technology Conference, (VTC
, pp. 15
-
-
Safdar, G.A.1
O'Neill, M.2
-
42
-
-
77953195920
-
Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach
-
6-9 April2010, Singapore
-
L. Husheng and H. Zhu, "Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach," in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN2010), vol., no., pp.1-12,6-9 April2010, Singapore.
-
IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN2010), vol., no
, pp. 1-12
-
-
Husheng, L.1
Zhu, H.2
-
43
-
-
62449144001
-
Secure cognitive networks
-
27-28 Oct.2008, Amsterdam, The Netherlands
-
N.R. Prasad, "Secure Cognitive Networks," in European Conference on Wireless Technology (EuWiT2008), vol., no., pp.107-110,27-28 Oct.2008, Amsterdam, The Netherlands.
-
(2008)
European Conference on Wireless Technology (EuWiT
, pp. 107-110
-
-
Prasad, N.R.1
-
44
-
-
77951429767
-
Security in cognitive radio networks: An example using the commercial
-
18-21 Oct.2009, Boston, MA, USA
-
A. N. Mody, R. Reddy, T. Kiernan, and T.X. Brown, "Security in cognitive radio networks: An example using the commercial IEEE802.22 standard," in IEEE Military Communications Conference (MILCOM2009), vol., no., pp.1-7,18-21 Oct.2009, Boston, MA, USA.
-
IEEE802.22 standard," in IEEE Military Communications Conference (MILCOM2009), vol., no
, pp. 17
-
-
Mody, A.N.1
Reddy, R.2
Kiernan, T.3
Brown, T.X.4
-
45
-
-
84906992545
-
Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks
-
Article ID695750,15 pages
-
W. Wenkai, L. Husheng, S. Yan and H. Zhu, "Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks", Eurasip Journal on Advances in Signal Processing, special issue on Advanced Signal Processing for Cognitive Radio Networks, vol.2010, Article ID695750,15 pages,2010.
-
(2010)
Eurasip Journal on Advances in Signal Processing special issue on Advanced Signal Processing for Cognitive Radio Networks
, pp. 2010
-
-
Wenkai, W.1
Husheng, L.2
Yan, S.3
Zhu, H.4
-
46
-
-
78751615533
-
Two types of attacks against cognitive radio network mac protocols
-
12-14 Dec.2008, Wuhan, Hubei, China
-
L. Zhu and Z. Huaibei, "Two Types of Attacks against Cognitive Radio Network MAC Protocols," in2008 International Conference on Computer Science and Software Engineering (CSSE2008), , vol.4, no., pp.1110-1113,12-14 Dec.2008, Wuhan, Hubei, China.
-
2008 International Conference on Computer Science and Software Engineering (CSSE2008
, vol.4
, pp. 1110-1113
-
-
Zhu, L.1
Huaibei, Z.2
-
47
-
-
15344342483
-
2004 Securing the download of radio configuration files for software defined radio devices", in
-
ACM, New York, NY, USA
-
A. Brawerman, D. Blough and B. Bing,2004, "Securing the download of radio configuration files for software defined radio devices", in Proc. of the second international workshop on Mobility management & wireless access protocols (MobiWac2004). ACM, New York, NY, USA.
-
Proc. of the second international workshop on Mobility management & wireless access protocols (MobiWac2004)
-
-
Brawerman, A.1
Blough, D.2
Bing, B.3
-
48
-
-
79955492762
-
Secure download system based on software defined radio composed of fpgas
-
15-18 Sept.2002, Lisboa, Portugal
-
H. Uchikawa, K. Umebayashi, and R. Kohn, "Secure download system based on software defined radio composed of FPGAs," in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC2002), vol.1, no., pp.437-441 vol.1,15-18 Sept.2002, Lisboa, Portugal.
-
(2002)
Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC
, Issue.1
, pp. 437-441
-
-
Uchikawa, H.1
Umebayashi, K.2
Kohn, R.3
-
49
-
-
1842865621
-
Radio software download for commercial wireless reconfigurable devices
-
Mar StateIl-PlaceNamePyung PlaceTypePark
-
J. CityHoffmeyer, StateIl-PlaceNamePyung PlaceTypePark, M. Majmundar, and S. Blust, "Radio software download for commercial wireless reconfigurable devices," IEEE Commun. Mag., vol.42, no.3, pp. S26-S32, Mar2004.
-
(2004)
IEEE Commun. Mag.
, vol.42
, Issue.3
-
-
CityHoffmeyer, J.1
Majmundar, M.2
Blust, S.3
-
50
-
-
78649441457
-
Proposal and evaluation of security schemes for software-defined radio
-
Beijing, China
-
H. Shiba, K. Uehara and K. Araki, "Proposal and evaluation of security schemes for software-defined radio," in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC2003), vol.1,2003, pp.114-118, Beijing, China.
-
Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC2003
, vol.1
, Issue.2003
, pp. 114-118
-
-
Shiba, H.1
Uehara, K.2
Araki, K.3
-
51
-
-
78649410340
-
Trusted computing technologies and their use in the provision of high assurance sdr platforms
-
Nov2006, Orlando, Florida, USA
-
E. Gallery and C. Mitchell, "Trusted computing technologies and their use in the provision of high assurance SDR platforms," in2006 Software Defined Radio Technical Conf. Product Exposition, Nov2006, Orlando, Florida, USA.
-
2006 Software Defined Radio Technical Conf. Product Exposition
-
-
Gallery, E.1
Mitchell, C.2
-
52
-
-
84949686528
-
The mils architecture for high-assurance embedded systems
-
J. Alves-Foss, P. W. Oman, C. Taylor, and W. S. Harrison, "The MILS architecture for high-assurance embedded systems," International J. Embedded Syst., vol.2, no.3/4, pp.239-247,2006.
-
(2006)
International J. Embedded Syst.
, vol.2
, Issue.3-4
, pp. 239-247
-
-
Alves-Foss, J.1
Oman, P.W.2
Taylor, C.3
Harrison, W.S.4
-
53
-
-
12344302980
-
A multi-layered approach to security in high assurance systems
-
Track9 Jan.2004, Big Island, HI, USA
-
J. Alves-Foss, C. Taylor, and P. Oman, "A multi-layered approach to security in high assurance systems," in Proc.37th Annual Hawaii International Conf. Syst. Sciences (HICSS2004)-Track9,2004., vol.9, Jan.2004, Big Island, HI, USA.
-
(2004)
Proc.37th Annual Hawaii International Conf. Syst. Sciences (HICSS2004)
, vol.9
-
-
Alves-Foss, J.1
Taylor, C.2
Oman, P.3
-
54
-
-
84861331255
-
Updated system threat analysis for high assurance software defined radios", in
-
SDR Forum, Anaheim, CA November
-
D. Murotake and A. Martin, "Updated system threat analysis for high assurance software defined radios", in Proceedings, SDR'05 Technical Conference, SDR Forum, Anaheim, CA, November2005.
-
(2005)
Proceedings, SDR'05 Technical Conference
-
-
Murotake, D.1
Martin, A.2
-
55
-
-
77949356469
-
Reputation-based cooperative spectrum sensing with trusted nodes assistance
-
March
-
Z. Kun, P. Paweczak, and D. Cabric, "Reputation-based cooperative spectrum sensing with trusted nodes assistance," IEEE Communications Letters, vol.14, no.3, pp.226-228, March2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.3
, pp. 226-228
-
-
Kun, Z.1
Paweczak, P.2
Cabric, D.3
-
56
-
-
73149102080
-
Cooperative spectrum sensing with double threshold detection based on reputation in cognitive radio
-
24-26 Sept.2009, Beijing, China
-
L. Duan, Z. Lei, C. Yujun, and L. Shouyin, "Cooperative Spectrum Sensing with Double Threshold Detection Based on Reputation in Cognitive Radio," in 5th International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom2009), vol., no., pp.1-4,24-26 Sept.2009, Beijing, China.
-
5th International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom2009), vol., no
, pp. 14
-
-
Duan, L.1
Lei, Z.2
Yujun, C.3
Shouyin, L.4
-
57
-
-
70349659935
-
Attack-proof collaborative spectrum sensing in cognitive radio networks
-
18-20 March2009, Baltimore, MD, USA
-
W. Wenkai, L. Husheng, S. Yan, and H. Zhu, "Attack-proof collaborative spectrum sensing in cognitive radio networks," in43rd Annual Conference on Information Sciences and Systems (CISS2009) , vol., no., pp.130-134,18-20 March2009, Baltimore, MD, USA.
-
43rd Annual Conference on Information Sciences and Systems (CISS2009) , vol., no
, pp. 130-134
-
-
Wenkai, W.1
Husheng, L.2
Yan, S.3
Zhu, H.4
-
58
-
-
51249091375
-
Secure cooperative sensing techniques for cognitive radio system
-
19-23 May2008, Beijing, China
-
P. Kaligineedi, M. Khabbazian and V. Bhargava, "Secure cooperative sensing techniques for cognitive radio system," in IEEE International Conference on Communications (ICC2008), vol., no., pp.3406-3410,19-23 May2008, Beijing, China.
-
IEEE International Conference on Communications (ICC2008), vol., no
, pp. 3406-3410
-
-
Kaligineedi, P.1
Khabbazian, M.2
Bhargava, V.3
-
59
-
-
71049125287
-
The research of cross-layer architecture design and security for cognitive radio network
-
16-17 May2009. Ternopil, Ukraine
-
Y. Peng, X. FengHong, L. Hua, and P. Jie, "The Research of Cross-Layer Architecture Design and Security for Cognitive Radio Network," in International Symposium on Information Engineering and Electronic Commerce (IEEC2009)., vol., no., pp.603-607,16-17 May2009. Ternopil, Ukraine.
-
International Symposium on Information Engineering and Electronic Commerce (IEEC2009)., vol., no
, pp. 603-607
-
-
Peng, Y.1
FengHong, X.2
Hua, L.3
Jie, P.4
-
60
-
-
77952180713
-
Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks
-
5-9 Jan. Bangalore, India
-
P. Anand, A.S. Rawat, C. Hao, and P.K. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in Cognitive Radio Networks," in Second International Conference on Communication Systems and Networks (COMSNETS2010), vol., no., pp.1-9, 5-9 Jan.2010, Bangalore, India.
-
(2010)
Second International Conference on Communication Systems and Networks (COMSNETS2010), vol., no.
, pp. 19
-
-
Anand, P.1
Rawat, A.S.2
Hao, C.3
Varshney, P.K.4
-
61
-
-
70349653799
-
Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks
-
Spring26-29 April2009, Barcelona, Spain
-
X. Shaoyi, S. Yanlei, and W. Haiming, "Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks," in IEEE69th Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
-
(2009)
IEEE69th Vehicular Technology Conference, (VTC
, pp. 15
-
-
Shaoyi, X.1
Yanlei, S.2
Haiming, W.3
-
62
-
-
77951486373
-
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
-
18-21 Oct.2009, Boston, MA, USA
-
F.R. Yu, H. Tang, H. Minyi, L. Zhiqiang, and P.C. Mason, "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios," in IEEE Military Communications Conference, (MILCOM2009), vol., no., pp.1-7,18-21 Oct.2009, Boston, MA, USA.
-
IEEE Military Communications Conference, (MILCOM2009), vol., no
, pp. 17
-
-
Yu, F.R.1
Tang, H.2
Minyi, H.3
Zhiqiang, L.4
Mason, P.C.5
-
63
-
-
70349185618
-
A survey of spectrum sensing algorithms for cognitive radio applications
-
First Quarter
-
T. Yucek, H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys Tutorials, vol.11, no.1, pp.116-130, First Quarter2009.
-
(2009)
IEEE Commun. Surveys Tutorials
, vol.11
, Issue.1
, pp. 116-130
-
-
Yucek, T.1
Arslan, H.2
-
64
-
-
38149111701
-
Ensuring trustworthy spectrum sensing in cognitive radio networks
-
25-25 Sept.2006, Orlando, Florida, USA
-
R. Chen, J.M. Park, "Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks,"1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no., pp.110-119,25-25 Sept.2006, Orlando, Florida, USA.
-
1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no
, pp. 110-119
-
-
Chen, R.1
Park, J.M.2
-
65
-
-
70449468191
-
A new cooperative detection technique with malicious user suppression
-
14-18 June2009, Dresden, Germany
-
Z. Tingting, Z. Yuping, "A New Cooperative Detection Technique with Malicious User Suppression," IEEE International Conference on Communications, (ICC2009), vol., no., pp.1-5,14-18 June2009, Dresden, Germany.
-
IEEE International Conference on Communications, (ICC2009), vol., no
, pp. 15
-
-
Tingting, Z.1
Yuping, Z.2
-
66
-
-
42649115995
-
Overhead analysis for radio environment map-enabled cognitive radio networks
-
25-25 Sept.2006, Orlando, Florida
-
Y. Zhao, J. H. Reed, S. Mao, and K. K. Bae, "Overhead Analysis for Radio Environment Map-enabled Cognitive Radio Networks,"1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no., pp.18-25,25-25 Sept.2006, Orlando, Florida.
-
1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no
, pp. 18-25
-
-
Zhao, Y.1
Reed, J.H.2
Mao, S.3
Bae, K.K.4
-
67
-
-
77954019396
-
A phy-layer authentication approach for transmitter identification in cognitive radio networks
-
12-14 April2010, Shenzhen, China
-
Caidan Zhao; Liang Xie; Xueyuan Jiang; Lianfen Huang; Yan Yao; , "A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks,"2010 International Conference on Communications and Mobile Computing (CMC2010), vol.2, no., pp.154-158,12-14 April2010, Shenzhen, China.
-
2010 International Conference on Communications and Mobile Computing (CMC2010), vol.2, no
, pp. 154-158
-
-
Zhao, C.1
Xie, L.2
Jiang, X.3
Huang, L.4
Yao, Y.5
-
68
-
-
70449103441
-
On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature
-
3-6 Aug.2009, San Francisco, CA, USA
-
O.R. Afolabi, K. Kiseon, Ahmad, A, "On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature," Proc. of18th International Conference on Computer Communications and Networks, (ICCCN2009), vol., no., pp.1-5,3-6 Aug.2009, San Francisco, CA, USA.
-
Proc. of18th International Conference on Computer Communications and Networks, (ICCCN2009), vol., no
, pp. 15
-
-
Afolabi, O.R.1
Kiseon, K.2
Ahmad, A.3
-
69
-
-
48049106004
-
A radio-independent authentication protocol (eap-crp) for networks of cognitive radios
-
18-21 June2007, San Diego, California, USA
-
M. Kuroda, R. Nomura, W. Trappe, "A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios,"4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (SECON2007), vol., no., pp.70-79,18-21 June2007, San Diego, California, USA.
-
4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (SECON2007), vol., no
, pp. 70-79
-
-
Kuroda, M.1
Nomura, R.2
Trappe, W.3
-
70
-
-
70449368657
-
A survey of survivability in mobile ad hoc networks
-
First Quarter
-
M. CityLima, A. dos Santos, G. Pujolle, "A survey of survivability in mobile ad hoc networks," IEEE Commun. Surveys Tutorials, vol.11, no.1, pp.66-77, First Quarter2009.
-
(2009)
IEEE Commun. Surveys Tutorials
, vol.1
, Issue.11
, pp. 66-77
-
-
CityLima, M.1
Dos Santos, A.2
Pujolle, G.3
-
71
-
-
0242678584
-
Self-organized public key management for mobile ad hoc networks
-
S. Capkun, L. Buttyan, and J.-P. Hubaux. Self-organized public key management for mobile ad hoc networks. IEEE Trans. Mobile Comput., Vol.2, No.1, pp. 52-64,2003.
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
72
-
-
70449473167
-
Towards secure spectrum decision
-
14-18 June2009, Dresden, Germany
-
G. Jakimoski and K.P. Subbalakshmi, "Towards Secure Spectrum Decision," IEEE International Conference on Communications, (ICC2009), vol., no., pp.1-5,14-18 June2009, Dresden, Germany.
-
IEEE International Conference on Communications, (ICC2009), vol., no
, pp. 15
-
-
Jakimoski, G.1
Subbalakshmi, K.P.2
-
73
-
-
70349664565
-
Common control channel security framework for cognitive radio networks," in the
-
Spring26-29 April2009, Barcelona, Spain
-
G.A. Safdar and M. O'Neill, "Common Control Channel Security Framework for Cognitive Radio Networks," in the69th Vehicular Technology Conference (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
-
(2009)
69th Vehicular Technology Conference (VTC
, pp. 15
-
-
Safdar, G.A.1
O'Neill, M.2
-
74
-
-
39349088878
-
Design of anti-jamming coding for cognitive radio
-
26-30 Nov.2007, Washington D.C., USA
-
Y. Guosen, W. Xiaodong and M. Madihian, "Design of Anti-Jamming Coding for Cognitive Radio," in IEEE Global Telecommunications Conference, (GLOBECOM2007), vol., no., pp.4190-4194,26-30 Nov.2007, Washington D.C., USA.
-
IEEE Global Telecommunications Conference, (GLOBECOM2007), vol., no
, pp. 4190-4194
-
-
Guosen, Y.1
Xiaodong, W.2
Madihian, M.3
-
75
-
-
73049083486
-
Anti-jamming coding techniques with application to cognitive radio
-
December
-
Y. Guosen and W. Xiaodong, "Anti-jamming coding techniques with application to cognitive radio," IEEE Trans. Wireless Commun., , vol.8, no.12, pp.5996-6007, December2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.12
, pp. 5996-6007
-
-
Guosen, Y.1
Xiaodong, W.2
-
76
-
-
70349682523
-
Secure physical layer using dynamic permutations in cognitive ofdma systems
-
Spring26-29 April2009
-
F. Meucci, S.A. Wardana and N.R. Prasad, "Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems," in IEEE69th Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009.
-
(2009)
IEEE69th Vehicular Technology Conference, (VTC
, pp. 15
-
-
Meucci, F.1
Wardana, S.A.2
Prasad, N.R.3
-
77
-
-
57849154890
-
Spectrum enforcement and liability assignment in cognitive radio systems
-
Oct.2008, Chicago, IL
-
G. Atia, A. Sahai, and V. Saligrama, "Spectrum enforcement and liability assignment in cognitive radio systems," in Proc. of the Third IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DYSPAN2008), Oct.2008, Chicago, IL.
-
(2008)
Proc. of the Third IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DYSPAN
-
-
Atia, G.1
Sahai, A.2
Saligrama, V.3
-
78
-
-
77951486373
-
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
-
18-21 Oct.2009, Boston, MA
-
F.R. Yu, H. Tang, H. Minyi, L. Zhiqiang and P.C. Mason, "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios," in IEEE Military Communications Conference, (MILCOM2009), vol., no., pp.1-7,18-21 Oct.2009, Boston, MA,2009.
-
IEEE Military Communications Conference, (MILCOM2009), vol., no
, vol.2009
, pp. 17
-
-
Yu, F.R.1
Tang, H.2
Minyi, H.3
Zhiqiang, L.4
Mason, P.C.5
-
79
-
-
33749154671
-
Difficulties in providing certification and assurance for software defined radios
-
DOI 10.1109/DYSPAN.2005.1542666, 1542666, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
-
J. Giacomoni and D.C. Sicker, "Difficulties in providing certification and assurance for software defined radios," in First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DySPAN2005)., vol., no., pp.526-538,8-11 Nov.2005. (Pubitemid 44467825)
-
(2005)
2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
, pp. 526-538
-
-
Giacomoni, J.1
Sicker, D.C.2
-
80
-
-
84861329046
-
Certification of sdrs in new public and governmental security systems
-
Oct.2008
-
S. Nagel, V. Blaschke, J. Elsner, F. K. Jondral, and D. Symeonidis, "Certification of SDRs in new public and governmental security systems," in SDR Technical Conf. Product Exposition (SDR2008), Oct.2008.
-
(2008)
SDR Technical Conf. Product Exposition (SDR
-
-
Nagel, S.1
Blaschke, V.2
Elsner, J.3
Jondral, F.K.4
Symeonidis, D.5
-
81
-
-
84861336642
-
-
ET Docket No. 03-108
-
Federal Communications Commission, "In the matter of facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, report and order," Mar.2005, FCC 05-57, ET Docket No. 03-108.
-
The matter of facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, report and order Mar.2005 FCC
, vol.5-57
-
-
Commission, F.C.1
-
82
-
-
84861336641
-
-
FP7 EULER CORDIS web page. Last accessed27/06/2010
-
FP7 EULER CORDIS web page. http://cordis.europa.eu. Last accessed27/06/2010.
-
-
-
-
83
-
-
77955377246
-
European standardization and sdr certification
-
9-15 May2010, Barcelona, Spain
-
D. Symeonidis and G. Baldini, "European Standardization and SDR Certification," in Telecommunications (AICT),2010 Sixth Advanced International Conference on, vol., no., pp.136-141,9-15 May2010, Barcelona, Spain.
-
Telecommunications (AICT),2010 Sixth Advanced International Conference on, vol., no
, pp. 136-141
-
-
Symeonidis, D.1
Baldini, G.2
-
84
-
-
70449471223
-
Cooperative shared spectrum sensing for dynamic cognitive radio networks
-
14-18 June , Dresden, Germany
-
A.R. Biswas, T.C. Aysal, S. Kandeepan, D. Kliazovich and R. Piesiewicz, "Cooperative Shared Spectrum Sensing for Dynamic Cognitive Radio Networks," in IEEE International Conference on Communications, (ICC2009), vol., no., pp.1-5,14-18 June2009, Dresden, Germany.
-
(2009)
IEEE International Conference on Communications, (ICC2009), vol., no.
, pp. 15
-
-
Biswas, A.R.1
Aysal, T.C.2
Kandeepan, S.3
Kliazovich, D.4
Piesiewicz, R.5
-
85
-
-
48349130414
-
Trieste: A trusted radio infrastructure for enforcing spectrum etiquettes
-
25-25 Sept
-
W. Xu, P. Kamat, and W. Trappe, "TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes," in1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no., pp.101-109,25-25 Sept.2006.
-
(2006)
1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, (SDR2006), vol., no.
, pp. 101-109
-
-
Xu, W.1
Kamat, P.2
Trappe, W.3
-
86
-
-
51849103005
-
Secure transmission power of cognitive radios for dynamic spectrum access applications
-
19-21 March
-
L. Xiaohua, C. Jinying, and N. Fan, "Secure transmission power of cognitive radios for dynamic spectrum access applications," in42nd Annual Conference on Information Sciences and Systems, (CISS2008), vol., no., pp.213-218,19-21 March2008.
-
(2008)
42nd Annual Conference on Information Sciences and Systems, (CISS2008), vol., no.
, pp. 213-218
-
-
Xiaohua, L.1
Jinying, C.2
Fan, N.3
-
87
-
-
84861329043
-
-
Common Criteria National Institute of Standards and Technology Std [Online]. Available
-
Common Criteria, National Institute of Standards and Technology Std. [Online]. Available: http://csrc.nist.gov/cc
-
-
-
-
88
-
-
84861331251
-
-
Wireless Innovation Forum's Security Working Group. Document Id: WINNF-08-P-0013.
-
Wireless Innovation Forum's Security Working Group. Securing Software Reconfigurable Communications Devices. Document Id: WINNF-08-P-0013
-
Securing Software Reconfigurable Communications Devices
-
-
-
89
-
-
57849166272
-
Considerations for successful cognitive radio systems in us tv white space
-
14-17 Oct
-
D. Borth, R. Ekl, B. Oberlies, and S. Overby, "Considerations for Successful Cognitive Radio Systems in US TV White Space," in3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DySPAN2008), vol., no., pp.1-5,14-17 Oct.2008.
-
(2008)
3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DySPAN2008), vol., no.
, pp. 15
-
-
Borth, D.1
Ekl, R.2
Oberlies, B.3
Overby, S.4
-
90
-
-
85008048349
-
Ieee802.22: The first cognitive radio wireless regional area network standard
-
January
-
C. Stevenson, G. Chouinard, L. Zhongding, H. Wendong, S. Shellhammer, and W. Caldwell, "IEEE802.22: The first cognitive radio wireless regional area network standard," IEEE Commun. Mag., vol.47, no.1, pp.130-138, January2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.1
, pp. 130-138
-
-
Stevenson, C.1
Chouinard, G.2
Zhongding, L.3
Wendong, H.4
Shellhammer, S.5
Caldwell, W.6
-
92
-
-
52549084899
-
Security issues in cognitive networks", book chapter in
-
Ed. Qusay H. Mahmoud Wiley, ISBN:9780-470-061961
-
N. Chetan and K.P. Subbalakshmi, "Security Issues in Cognitive Networks", Book Chapter in Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:271-292, ISBN:9780-470-06196-1,2007.
-
(2007)
Cognitive Networks: Towards Self-Aware Networks
, pp. 271-292
-
-
Chetan, N.1
Subbalakshmi, K.P.2
-
93
-
-
77951454240
-
-
A. Mody, R. Reddy, M Sherman, T. Kiernan, and D. J. Shyy, "Security and Protocol Reference Model Enhancements in IEEE802.22," https://mentor.ieee.org/802.22/dcn/08/22-08-0083-08-0000security-and-prm- enhancements-in-80222-v3.ppt.
-
Security and Protocol Reference Model Enhancements in IEEE802.22
-
-
Mody, A.1
Reddy, R.2
Sherman, M.3
Kiernan, T.4
Shyy, D.J.5
-
94
-
-
58049092181
-
A proposed propagation-based methodology with which to address the hidden node problem and security/reliability issues in cognitive radio
-
12-14 Oct
-
E.O. Nuallain, "A Proposed Propagation-Based Methodology with Which to Address the Hidden Node Problem and Security/Reliability Issues in Cognitive Radio," in4th International Conference on Wireless Communications, Networking and Mobile Computing, (WiCOM2008), vol., no., pp.1-5,12-14 Oct.2008.
-
(2008)
4th International Conference on Wireless Communications, Networking and Mobile Computing, (WiCOM2008), vol., no.
, pp. 15
-
-
Nuallain, E.O.1
-
95
-
-
77955623517
-
Optimal siso and mimo spectral efficiency to minimize hidden-node network interference
-
July
-
D.W. Bliss, "Optimal SISO and MIMO Spectral Efficiency to Minimize Hidden-Node Network Interference," IEEE Commun. Lett., vol.14, no.7, pp.620-622, July2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.7
, pp. 620-622
-
-
Bliss, D.W.1
-
96
-
-
77249105602
-
Standardization and research in cognitive and dynamic spectrum access networks
-
January2010
-
F. Granelli, P. Pawelczak, R.V. Prasad, K.P. Subbalakshmi, R. Chandramouli, J.A. Hoffmeyer, and H.S. Berger, "Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities," IEEE Commun. Mag., vol.48, no.1, pp.71-79, January2010.
-
IEEE SCC41 efforts and other activities IEEE Commun. Mag
, vol.48
, Issue.1
, pp. 71-79
-
-
Granelli, F.1
Pawelczak, P.2
Prasad, R.V.3
Subbalakshmi, K.P.4
Chandramouli, R.5
Hoffmeyer, J.A.6
Berger, H.S.7
-
97
-
-
51649095131
-
A novel handover protocol to prevent hidden node problem in satellite assisted cognitive radio networks
-
7-9 May
-
D. Gozupek, S. Bayhan, and F. Alagoz, "A novel handover protocol to prevent hidden node problem in satellite assisted cognitive radio networks," in3rd International Symposium on Wireless Pervasive Computing, (ISWPC2008), vol., no., pp.693-696,7-9 May2008.
-
(2008)
3rd International Symposium on Wireless Pervasive Computing (ISWPC2008), vol., no.
, pp. 693-696
-
-
Gozupek, D.1
Bayhan, S.2
Alagoz, F.3
-
98
-
-
84857501981
-
A survey on mac strategies for cognitive radio networks
-
A. De Domenico, E. Calvanese Strinati, and M.G. Di Benedetto, "A Survey on MAC Strategies for Cognitive Radio Networks," IEEE Commun. Surveys Tutorials, vol.PP, no.99, pp.1-24, 0
-
IEEE Commun. Surveys Tutorials
, vol.0
, Issue.99 PP
, pp. 1-24
-
-
De Domenico, A.1
Calvanese Strinati, E.2
Di Benedetto, M.G.3
-
100
-
-
58049207983
-
Policy-based spectrum access control for dynamic spectrum access network radios", in
-
The Semantic Web and Policy January Pages21-27, ISSN1570-
-
F. Perich, and M. McHenry, "Policy-based spectrum access control for dynamic spectrum access network radios", in Web Semantics: Science, Services and Agents on the World Wide Web, Volume7, Issue1, The Semantic Web and Policy, January2009, Pages21-27, ISSN1570-8268.
-
(2009)
Web Semantics: Science, Services and Agents on the World Wide Web
, vol.7
, Issue.1
, pp. 8268
-
-
Perich, F.1
McHenry, M.2
|