-
1
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug.
-
J. Mitola and G. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
-
(1999)
IEEE Personal Commun.
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola, J.1
Maguire, G.2
-
2
-
-
13844296408
-
Cognitive radio: Brain empowered wireless communications
-
Feb.
-
S. Haykin, "Cognitive radio: brain empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
3
-
-
33745648091
-
NeXt generation/ dynamic spectrum access/cognitive radio wireless networks: A survey
-
Sep.
-
I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "NeXt generation/ dynamic spectrum access/cognitive radio wireless networks: a survey," Elsevier J. Comput. Netw., vol. 50, no. 13, pp. 2127-2159, Sep. 2006.
-
(2006)
Elsevier J. Comput. Netw.
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.2
Vuran, M.C.3
Mohanty, S.4
-
5
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J. M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.M.2
Reed, J.H.3
-
8
-
-
77954909920
-
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing
-
Apr.
-
-, "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 13, no. 2, pp. 74-85, Apr. 2009.
-
(2009)
ACM SIGMOBILE Mobile Comput. Commun. Rev.
, vol.13
, Issue.2
, pp. 74-85
-
-
Jin, Z.1
Anand, S.2
Subbalakshmi, K.P.3
-
12
-
-
84866728131
-
Anti-pue attack base on the transmitter fingerprint identification in cognitive radio
-
C. Zhao, W. Wang, L. Huang, and Y. Yao, "Anti-pue attack base on the transmitter fingerprint identification in cognitive radio," in Proc. 2009 Wireless Commun., Netw. Mobile Comput. Conf.
-
Proc. 2009 Wireless Commun., Netw. Mobile Comput. Conf
-
-
Zhao, C.1
Wang, W.2
Huang, L.3
Yao, Y.4
-
13
-
-
77951170945
-
Modeling primary user emulation attacks and defenses in cognitive radio networks
-
Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez, "Modeling primary user emulation attacks and defenses in cognitive radio networks," in Proc. 2009 IEEE Intl. Perf. Comput. Commun. Conf., pp. 208-215.
-
Proc. 2009 IEEE Intl. Perf. Comput. Commun. Conf.
, pp. 208-215
-
-
Chen, Z.1
Cooklev, T.2
Chen, C.3
Pomalaza-Raez, C.4
-
14
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems-part I: Known channel statistics
-
Nov.
-
H. Li and Z. Han, "Dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems-part I: known channel statistics," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3566-3577, Nov. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
15
-
-
78651520951
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems-part II: Unknown channel statistics
-
Jan.
-
-, "Dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems-part II: unknown channel statistics," IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 274-283, Jan. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.1
, pp. 274-283
-
-
Li, H.1
Han, Z.2
-
16
-
-
77955813118
-
JENNA: A jamming-evasive network coding neighbor-discovery algorithm for cognitive radio networks
-
Aug.
-
A. Asterjadhi and M. Zorzi, "JENNA: a jamming-evasive network coding neighbor-discovery algorithm for cognitive radio networks," IEEE Wireless Commun., vol. 17, no. 4, pp. 24-32, Aug. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.4
, pp. 24-32
-
-
Asterjadhi, A.1
Zorzi, M.2
-
20
-
-
67349182123
-
Primary-prioritized Markov approach for dynamic spectrum allocation
-
Apr.
-
B. Wang, Z. Ji, K. J. R. Liu, and T. C. Clancy, "Primary-prioritized Markov approach for dynamic spectrum allocation," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1854-1865, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1854-1865
-
-
Wang, B.1
Ji, Z.2
Liu, K.J.R.3
Clancy, T.C.4
-
21
-
-
85164888804
-
Performance analysis of dynamic spectrum access networks under primary user emulation attacks
-
Z. Jin, S. Anand, and K. P. Subbalakshmi, "Performance analysis of dynamic spectrum access networks under primary user emulation attacks," in Proc. 2010 IEEE Global Commun. Conf.
-
Proc. 2010 IEEE Global Commun. Conf
-
-
Jin, Z.1
Anand, S.2
Subbalakshmi, K.P.3
|