-
1
-
-
85008048349
-
IEEE 802.22: The first cognitive radio wireless regional area network standard
-
Jan
-
C. Stevenson, G. Chouinard, L. Zhongding, W. Hu, S. Shellhammer, and W. Caldwell, BIEEE 802.22: The first cognitive radio wireless regional area network standard,[ IEEE Commun. Mag., vol. 47, no. 1, pp .130-138, Jan. 2009.
-
(2009)
IEEE Commun. Mag
, vol.47
, Issue.1
, pp. 130-138
-
-
Stevenson, C.1
Chouinard, G.2
Zhongding, L.3
Hu, W.4
Shellhammer, S.5
Caldwell, W.6
-
2
-
-
42649140294
-
Cognitive functionality in next generation wireless networks: Standardization efforts
-
DOI 10.1109/MCOM.2008.4481343
-
R. V. Prasad, P. Pawelczak, J. A. Hoffmeyer, and H. S. Berger, BCognitive functionality in next generation wireless networks: Standardization efforts,[ IEEE Commun. Mag., vol. 46, no. 4, pp. 72-78, Apr. 2008. (Pubitemid 351593410)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 72-78
-
-
Prasad, R.V.1
Pawiczak, P.2
Hoffmeyer, J.A.3
Berger, H.S.4
-
3
-
-
52549109488
-
Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
-
Oct
-
T. X. Brown and A. Sethi, BPotential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment,[ Mobile Net. Appl., vol. 13, no. 5, pp. 516-532, Oct. 2008.
-
(2008)
Mobile Net. Appl
, vol.13
, Issue.5
, pp. 516-532
-
-
Brown, T.X.1
Sethi, A.2
-
4
-
-
51749120340
-
Security in cognitive radio networks: Threats and mitigation
-
Singapore May 15-17 DOI: 10.1109/CROWNCOM20084562534
-
T. C. Clancy and N. Goergen, BSecurity in cognitive radio networks: Threats and mitigation,[ in Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun., Singapore, May 15-17, 2008, DOI: 10.1109/CROWNCOM.2008.4562534.
-
(2008)
Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun.
-
-
Clancy, T.C.1
Goergen, N.2
-
5
-
-
51749122004
-
Security in cognitive radio networks: The required evolution in approaches to wireless network security
-
Singapore May 15-17 DOI: 10.1109/CROWNCOM20084562536
-
J. L. Burbank, BSecurity in cognitive radio networks: The required evolution in approaches to wireless network security,[ in Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun., Singapore, May 15-17, 2008, DOI: 10.1109/CROWNCOM.2008.4562536.
-
(2008)
Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun.
-
-
Burbank, J.L.1
-
6
-
-
77951429767
-
Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
-
Boston, MA, Oct. 18-21 DOI: 10.1109/MILCOM20095380058
-
A. N. Mody, R. Reddy, T. Kiernan, and T. X. Brown, BSecurity in cognitive radio networks: An example using the commercial IEEE 802.22 standard,[ in Proc. IEEE Military Commun. Conf., Boston, MA, Oct. 18-21, 2009, DOI: 10.1109/MILCOM.2009. 5380058.
-
(2009)
Proc. IEEE Military Commun. Conf.
-
-
Mody, A.N.1
Reddy, R.2
Kiernan, T.3
Brown, T.X.4
-
7
-
-
77955385262
-
Coordinated denial-of-service attacks in IEEE 802.22 networks
-
Cape Town, South Africa, May 23-27 DOI: 10.1109/ICC.2010. 5502431
-
Y. Tan, S. Sengupta, and K. P. Subbalakshmi, BCoordinated denial-of-service attacks in IEEE 802.22 networks,[ in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 23-27, 2010, DOI: 10.1109/ICC.2010. 5502431.
-
(2010)
Proc. IEEE Int. Conf. Commun.
-
-
Tan, Y.1
Sengupta, S.2
Subbalakshmi, K.P.3
-
8
-
-
79551641831
-
Denial of service attacks in cognitive radio networks through channel eviction triggering
-
Miami, FL, Dec 6-10 DOI: 10.1109/GLOCOM.2010. 5683177
-
S. Sodagari, A. Attar, V. Leung, and S. Bilen, BDenial of service attacks in cognitive radio networks through channel eviction triggering,[ in Proc. IEEE Global Telecommun. Conf., Miami, FL, Dec. 6-10, 2010, DOI: 10.1109/GLOCOM.2010. 5683177.
-
(2010)
Proc. IEEE Global Telecommun. Conf.
-
-
Sodagari, S.1
Attar, A.2
Leung, V.3
Bilen, S.4
-
9
-
-
42549125692
-
Cooperative sensing among cognitive radios
-
DOI 10.1109/ICC.2006.254957, 4024390, 2006 IEEE International Conference on Communications, ICC 2006
-
S. M. Mishra, A. Sahai, and R. W. Brodersen, BCooperative sensing among cognitive radios,[ in Proc. IEEE Int. Conf. Commun., Istanbul, Turkey, Jun. 2006, vol. 4, pp. 1658-1663. (Pubitemid 351575230)
-
(2006)
IEEE International Conference on Communications
, vol.4
, pp. 1658-1663
-
-
Mishra, S.M.1
Sahai, A.2
Brodersen, R.W.3
-
10
-
-
33847674846
-
On the energy detection of unknown signals over fading channels
-
DOI 10.1109/TCOMM.2006.887483
-
F. F. Digham,M.-S. Alouini, andM. K. Simon, BOn the energy detection of unknown signals over fading channels,[ IEEE Trans. Commun., vol. 55, no. 1, pp. 21-24, Jan. 2007. (Pubitemid 46351039)
-
(2007)
IEEE Transactions on Communications
, vol.55
, Issue.1
, pp. 21-24
-
-
Digham, F.F.1
Alouini, M.-S.2
Simon, M.K.3
-
11
-
-
35748975694
-
Spectrum sensing in cognitive radio networks: The cooperation-processing tradeoff
-
DOI 10.1002/wcm.480
-
A. Ghasemi and E. S. Sousa, BSpectrum sensing in cognitive radio networks: The cooperation-processing tradeoff,[ Wireless Commun. Mobile Comput., vol. 7, no. 9, pp. 1049-1060, May 2007. (Pubitemid 350044684)
-
(2007)
Wireless Communications and Mobile Computing
, vol.7
, Issue.9
, pp. 1049-1060
-
-
Ghasemi, A.1
Sousa, E.S.2
-
12
-
-
40849116275
-
SNR walls for signal detection
-
DOI 10.1109/JSTSP.2007.914879
-
R. Tandra and A. Sahai, BSNR walls for signal detection,[ IEEE J. Sel. Areas Commun., vol. 2, no. 1, pp. 4-17, Feb. 2008. (Pubitemid 351392284)
-
(2008)
IEEE Journal on Selected Topics in Signal Processing
, vol.2
, Issue.1
, pp. 4-17
-
-
Tandra, R.1
Sahai, A.2
-
13
-
-
77952740125
-
Sensing techniques for cognitive radioVState of the art and trends
-
Apr
-
D. Noguet et al., BSensing techniques for cognitive radioVState of the art and trends,[ in IEEE SCC41-P1900.6 White Paper, Apr. 2009.
-
(2009)
IEEE SCC41-P1900.6 White Paper
-
-
Noguet, D.1
-
14
-
-
70349185618
-
A survey of spectrum sensing algorithms for cognitive radio applications
-
First Quarter
-
T. Yucek and H. Arslan, BA survey of spectrum sensing algorithms for cognitive radio applications,[ IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
-
(2009)
IEEE Commun. Surv. Tut
, vol.11
, Issue.1
, pp. 116-130
-
-
Yucek, T.1
Arslan, H.2
-
15
-
-
35048873730
-
Communication system recognition by modulation recognition
-
Fortaleza Brazil Aug. 1-7 DOI: 10.1007/978-3-540-27824-516
-
A. Attar, A. Sheikhi, and A. Zamani, BCommunication system recognition by modulation recognition,[ in Proc. 11th Int. Conf. Telecommun., Fortaleza, Brazil, Aug. 1-7, 2004, pp. 106-113, DOI: 10.1007/978-3-540-27824-516.
-
(2004)
Proc. 11th Int. Conf. Telecommun.
, pp. 106-113
-
-
Attar, A.1
Sheikhi, A.2
Zamani, A.3
-
16
-
-
78649243403
-
Quickest detection in multiple ON-OFF processes
-
Dec
-
Q. Zhao and J. Ye, BQuickest detection in multiple ON-OFF processes,[ IEEE Trans. Signal Process., vol. 58, no. 12, pp. 5994-6006, Dec. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.12
, pp. 5994-6006
-
-
Zhao, Q.1
Ye, J.2
-
18
-
-
77952492719
-
Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios
-
May-Jun
-
F. R. Yu, M. Huang, and H. Tang, BBiologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios,[ IEEE Networks, vol. 24, no. 3, pp. 26-30, May-Jun. 2010.
-
(2010)
IEEE Networks
, vol.24
, Issue.3
, pp. 26-30
-
-
Yu, F.R.1
Huang, M.2
Tang, H.3
-
19
-
-
36348966535
-
BIOlogically-inspired spectrum sharing in cognitive radio networks
-
DOI 10.1109/WCNC.2007.14, 4204190, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
-
B. Atakan and O. B. Akan, BBiologically-inspired spectrum sharing in cognitive radio networks,[ in Proc. IEEE Wireless Commun. Netw. Conf., Hong Kong, Mar. 11-15, 2007, pp. 43-48. (Pubitemid 350139364)
-
(2007)
IEEE Wireless Communications and Networking Conference, WCNC
, pp. 43-48
-
-
Baris, A.1
Akan, O.B.2
-
20
-
-
76849089351
-
A distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios
-
Jan
-
Z. Li, F. R. Yu, and M. Huang, BA distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios,[ IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 383-393, Jan. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.59
, Issue.1
, pp. 383-393
-
-
Li, Z.1
Yu, F.R.2
Huang, M.3
-
21
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
DOI 10.1109/JSAC.2004.839380
-
S. Haykin, BCognitive radio: Brain-empowered wireless communications,[ IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005. (Pubitemid 40245487)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
22
-
-
84890916209
-
Cognitive medium access: Exploration exploitation and competition
-
Feb
-
L. Lifeng, H. El Gamal, J. Hai, and H. V. Poor, BCognitive medium access: Exploration, exploitation, and competition,[ IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 239-253, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Comput
, vol.10
, Issue.2
, pp. 239-253
-
-
Lifeng, L.1
El Gamal, H.2
Hai, J.3
Poor, H.V.4
-
23
-
-
44949212153
-
A universal resource awareness channel for cognitive radio
-
Helsinki, Finland Sep. 11-14 DOI: 10.1109/PIMRC.2006.254338
-
O. Holland, A. Attar, N. Olaziregi, N. Sattari, and A. H. Aghvami, BA universal resource awareness channel for cognitive radio,[ in Proc. IEEE Pers. Indoor Mobile Radio Commun., Helsinki, Finland, Sep. 11-14, 2006, DOI: 10.1109/PIMRC.2006.254338.
-
(2006)
Proc. IEEE Pers. Indoor Mobile Radio Commun.
-
-
Holland, O.1
Attar, A.2
Olaziregi, N.3
Sattari, N.4
Aghvami, A.H.5
-
24
-
-
70349664565
-
BCommon Control Channel Security Framework for Cognitive Radio Networks
-
Spring, Barcelona, Spain, Apr. 26-29 DOI: 10.1109/VETECS. 2009.5073450
-
G. A. Safdar and M. O'Neill, BCommon control channel security framework for cognitive radio networks,[ in Proc. IEEE Veh. Technol. Conf. Spring, Barcelona, Spain, Apr. 26-29, 2009, DOI: 10.1109/VETECS. 2009.5073450.
-
(2009)
Proc. IEEE Veh. Technol. Conf.
-
-
Safdar, G.A.1
O'Neill, M.2
-
25
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan
-
R. Chen, J.-M. Park, and J. H. Reed, BDefense against primary user emulation attacks in cognitive radio networks,[ IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel Areas Commun
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
26
-
-
71949106409
-
Attack-tolerant distributed sensing for dynamic spectrum access networks
-
Princeton, NJ, Oct. 13-16
-
A. W. Min, K. G. Shin, and X. Hu, BAttack-tolerant distributed sensing for dynamic spectrum access networks,[ in Proc. 17th IEEE Int. Conf. Netw. Protocols, Princeton, NJ, Oct. 13-16, 2009, pp. 294-303.
-
(2009)
Proc. 17th IEEE Int. Conf. Netw. Protocols
, pp. 294-303
-
-
Min, A.W.1
Shin, K.G.2
Hu, X.3
-
27
-
-
77954320949
-
Towards a trust aware cognitive radio architecture
-
Apr
-
T. Qin, H. Yu, C. Leung, Z. Shen, and C.Miao, BTowards a trust aware cognitive radio architecture,[ ACM Mobile Comput. Commun. Rev., vol. 13, no. 2, pp. 86-95, Apr. 2009.
-
(2009)
ACM Mobile Comput. Commun. Rev
, vol.13
, Issue.2
, pp. 86-95
-
-
Qin, T.1
Yu, H.2
Leung, C.3
Shen, Z.4
Miao, C.5
-
28
-
-
70349659935
-
Attack-proof collaborative spectrum sensing in cognitive radio networks
-
Baltimore MD Mar
-
W. Wangz, H. Liy, Y. Sunz, and Z. Han, BAttack-proof collaborative spectrum sensing in cognitive radio networks,[ in Proc. Conf. Inf. Sci. Syst., Baltimore, MD, Mar. 2009, pp. 130-134.
-
(2009)
Proc. Conf. Inf. Sci. Syst.
, pp. 130-134
-
-
Wangz, W.1
Liy, H.2
Sunz, Y.3
Han, Z.4
-
29
-
-
51249091375
-
Secure cooperative sensing techniques for cognitive radio systems
-
Beijing, China, May
-
P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, BSecure cooperative sensing techniques for cognitive radio systems,[ in Proc. IEEE Int. Conf. Commun., Beijing, China, May 2008, pp. 3406-3410.
-
(2008)
Proc. IEEE Int. Conf. Commun.
, pp. 3406-3410
-
-
Kaligineedi, P.1
Khabbazian, M.2
Bhargava, V.K.3
-
30
-
-
77954929710
-
A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks
-
Cape Town, South Africa, May DOI: 10.1109/ICCW. 2010.5503968
-
F. Gao, W. Yuan, W. Liu, W. Cheng, and S. Wang, BA robust and efficient cooperative spectrum sensing scheme in cognitive radio networks,[ in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 23-27, 2010, DOI: 10.1109/ICCW. 2010.5503968.
-
(2010)
Proc. IEEE Int. Conf. Commun.
, pp. 23-27
-
-
Gao, F.1
Yuan, W.2
Liu, W.3
Cheng, W.4
Wang, S.5
-
31
-
-
42649135628
-
Toward secure distributed spectrum sensing in cognitive radio networks
-
DOI 10.1109/MCOM.2008.4481340
-
R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, BToward secure distributed spectrum sensing in cognitive radio networks,[ IEEE Commun. Mag., vol. 46, no. 4, pp. 50-55, Apr. 2008. (Pubitemid 351593407)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 50-55
-
-
Chen, R.1
Park, J.-M.2
Hou, Y.T.3
Reed, J.H.4
-
32
-
-
77951486373
-
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
-
Boston, MA Oct DOI: 10.1109/MILCOM. 2009.5379832
-
F. R. Yu, H. Tang, M. Huang, Z. Li, and P. C. Mason, BDefense against spectrum sensing data falsification attacks in mobile Ad Hoc networks with cognitive radios,[ in Proc. IEEE Military Commun. Conf., Boston, MA, Oct. 2009, DOI: 10.1109/MILCOM. 2009.5379832.
-
(2009)
Proc. IEEE Military Commun Conf.
-
-
Yu, F.R.1
Tang, H.2
Huang, M.3
Li, Z.4
Mason, P.C.5
-
33
-
-
34247189646
-
Spectrum sharing for unlicensed bands
-
DOI 10.1109/JSAC.2007.070402, 4155367
-
R. Etkin, A. Parekh, and D. Tse, BSpectrum sharing for unlicensed bands,[ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517-528, Apr. 2007. (Pubitemid 46620946)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.3
, pp. 517-528
-
-
Etkin, R.1
Parekh, A.2
Tse, D.3
-
34
-
-
65949084488
-
Cognitive radio game for secondary spectrum access problem
-
Apr
-
A. Attar, M. R. Nakahi, and A. H. Aghvami, BCognitive radio game for secondary spectrum access problem,[ IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 2121-2131, Apr. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.8
, Issue.4
, pp. 2121-2131
-
-
Attar, A.1
Nakahi, M.R.2
Aghvami, A.H.3
-
35
-
-
84857478209
-
A market-clearing model for spectrum trade in cognitive radio networks
-
Paris, France, May DOI: 10.1145/2107502. 2107513
-
S.-S. Byun, I. Balasingham, and A. V. Vasilakos, BA market-clearing model for spectrum trade in cognitive radio networks,[ in Proc. 12th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Paris, France, May 2011, DOI: 10.1145/2107502. 2107513.
-
(2011)
Proc. 12th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
-
-
Byun, S.-S.1
Balasingham, I.2
Vasilakos, A.V.3
-
36
-
-
34247229185
-
Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework
-
Apr
-
Q. Zhao, L. Tong, A. Swami, and Y. Chen, BDecentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework,[ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589-600, Apr. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.3
, pp. 589-600
-
-
Zhao, Q.1
Tong, L.2
Swami, A.3
Chen, Y.4
-
37
-
-
69449100462
-
Optimality of myopic sensing in multichannel opportunistic access
-
Sep
-
S. Haji Ali Ahmad, M. Liu, T. Javidi, Q. Zhao, and B. Krishnamachari, BOptimality of myopic sensing in multichannel opportunistic access,[ IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4040-4050, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4040-4050
-
-
Haji Ali Ahmad, S.1
Liu, M.2
Javidi, T.3
Zhao, Q.4
Krishnamachari, B.5
-
38
-
-
76949096171
-
Betting on gilbert-elliot channels
-
Feb
-
A. Laourine and L. Tong, BBetting on Gilbert-Elliot channels,[ IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 723-733, Feb. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.2
, pp. 723-733
-
-
Laourine, A.1
Tong, L.2
-
39
-
-
79953827701
-
Distributed learning in multi-armed bandit with multiple players
-
Nov
-
K. Liu and Q. Zhao, BDistributed learning in multi-armed bandit with multiple players,[ IEEE Trans. Signal Process., vol. 58, no. 11, pp. 5667-5681, Nov. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.11
, pp. 5667-5681
-
-
Liu, K.1
Zhao, Q.2
-
41
-
-
0004049893
-
-
Ph.D. dissertation, Faculty Comput. Sci. Technol., Univ. Cambridge, Cambridge, U.K.
-
C. J. C. H. Watkins, BLearning from delayed rewards,[ Ph.D. dissertation, Faculty Comput. Sci. Technol., Univ. Cambridge, Cambridge, U.K., 1989.
-
(1989)
BLearning from Delayed Rewards
-
-
Watkins, C.J.C.H.1
-
43
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, BThe feasibility of launching and detecting jamming attacks in wireless networks,[ in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana, IL, May 25-28, 2005, pp. 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
44
-
-
79956100559
-
Jamming in wireless networks under uncertainty
-
Nov.
-
E. Altman, K. Avrachenkov, and A. Garnaev, BJamming in wireless networks under uncertainty,[ Mobile Netw. Appl., vol. 16, no. 2, pp. 246-254, Nov. 2010.
-
(2010)
Mobile Netw. Appl
, vol.16
, Issue.2
, pp. 246-254
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
45
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, BCapacity of cognitive interference channels with and without secrecy,[ IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
46
-
-
78751615533
-
Two types of attacks against cognitive radio network MAC protocols
-
Wuhan, China Dec
-
L. Zhu and H. Zhou, BTwo types of attacks against cognitive radio network MAC protocols,[ in Proc. Int. Conf. Comput. Sci. Softw. Eng., Wuhan, China, Dec. 2008, vol. 4, pp. 1110-1113.
-
(2008)
Proc. Int. Conf. Comput. Sci. Softw. Eng.
, vol.4
, pp. 1110-1113
-
-
Zhu, L.1
Zhou, H.2
-
47
-
-
80052019080
-
Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
-
Oct
-
A. W. Min, K. G. Shin, and X. Hu, BSecure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,[ IEEE Trans. Mobile Comput., vol. 10, no. 10, pp. 1434-1447, Oct. 2011.
-
(2011)
IEEE Trans. Mobile Comput
, vol.10
, Issue.10
, pp. 1434-1447
-
-
Min, A.W.1
Shin, K.G.2
Hu, X.3
-
48
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
New Orleans, LA, Feb. 25-26
-
C. E. Perkins and E. M. Royer, BAd-hoc on-demand distance vector routing,[ in Proc. 2nd IEEE Workshop Mobile Comput. Syst. Appl., New Orleans, LA, Feb. 25-26, 1999, pp. 90-100.
-
(1999)
Proc. 2nd IEEE Workshop Mobile Comput. Syst. Appl.
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
49
-
-
77956948315
-
A survey of trust and reputation management systems in wireless communications
-
Oct
-
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, BA survey of trust and reputation management systems in wireless communications,[ Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
-
(2010)
Proc. IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
-
50
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
DOI 10.1109/MPRV.2004.21
-
D. Dagon, T. Martin, and T. Starner, BMobile phones as computing devices: The viruses are coming![ IEEE Pervasive Comput., vol. 3, no. 4, pp. 11-15, Oct.-Dec. 2004. (Pubitemid 40010893)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
51
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
May
-
P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabási, BUnderstanding the spreading patterns of mobile phone viruses,[ Science, vol. 32, no. 5930, pp. 1071-1076, May 2009.
-
(2009)
Science
, vol.32
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
González, M.C.2
Hidalgo, C.A.3
Barabási, A.-L.4
-
52
-
-
50249185601
-
Dynamic scalable software downloads for mobile terminal mass-upgrades
-
Budapest Hungary Jul DOI: 10.1109/ISTMWC20074299035
-
O. Holland and A. H. Aghvami, BDynamic scalable software downloads for mobile terminal mass-upgrades,[ in Proc. IST Mobile Wireless Commun. Summit, Budapest, Hungary, Jul. 2007, DOI: 10.1109/ISTMWC. 2007.4299035.
-
(2007)
Proc. IST Mobile Wireless Commun. Summit
-
-
Holland, O.1
Aghvami, A.H.2
-
53
-
-
34548760352
-
IEEE P1900.B: Coexistence support for reconfigurable, heterogeneous air interfaces
-
DOI 10.1109/DYSPAN.2007.56, 4221518, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
M. Muck, S. Buljore, P. Martigne, A. Kousaridas, E. Patouni, M. Stamatelatos, K. Tsagkaris, J. Yang, and O. Holland, BIEEE P1900.B: Coexistence support for reconfigurable, heterogeneous air interfaces,[ in Proc. IEEE Int. Symp. New Frontiers Dynamic Spectrum Access Netw., Dublin, Ireland, Apr. 2007, pp. 381-389. (Pubitemid 47431674)
-
(2007)
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 381-389
-
-
Muck, M.1
Buljore, S.2
Martigne, P.3
Kousaridas, A.4
Patouni, E.5
Stamatelatos, M.6
Tsagkaris, K.7
Ji, Y.8
Holland, O.9
-
54
-
-
39349088878
-
Design of anti-jamming coding for cognitive radio
-
DOI 10.1109/GLOCOM.2007.797, 4411707, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
G. Yue, X. Wang, and M. Madihian, BDesign of anti-jamming coding for cognitive radio,[ in Proc. IEEE Global Telecommun. Conf., Washington, DC, Nov. 26-30, 2007, pp .4190-4194. (Pubitemid 351259782)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 4190-4194
-
-
Guosen, Y.1
Xiaodong, W.2
Madihian, M.3
-
55
-
-
79953200186
-
An Anti-jamming stochastic game for cognitive radio networks
-
Ar
-
B.Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, BAn anti-jamming stochastic game for cognitive radio networks,[ IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, Apr. 2011.
-
(2011)
IEEE J. Sel Areas Commun
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
Clancy, T.C.4
-
56
-
-
58349115014
-
Lightweight integrated authentication for tactical MANETS
-
Zhangjiajie, China, Nov. 18-21
-
H. Tang and M. Salmanian, BLightweight integrated authentication for tactical MANETS,[ in Proc. IEEE 9th Int. Conf. Young Comput. Sci., Zhangjiajie, China, Nov. 18-21, 2008, pp. 2266-2271.
-
(2008)
Proc. IEEE 9th Int. Conf. Young Comput. Sci.
, pp. 2266-2271
-
-
Tang, H.1
Salmanian, M.2
-
58
-
-
85008009601
-
A hierarchical identity based key management scheme in tactical mobile Ad Hoc networks
-
Dec
-
F. R. Yu, H. Tang, P. C. Mason, and F. Wang, BA hierarchical identity based key management scheme in tactical mobile Ad Hoc networks,[ IEEE Trans. Netw. Services Manage., vol. 7, no. 4, pp. 1932-4537, Dec. 2010.
-
(2010)
IEEE Trans. Netw. Services Manage
, vol.7
, Issue.4
, pp. 1932-4537
-
-
Yu, F.R.1
Tang, H.2
Mason, P.C.3
Wang, F.4
-
59
-
-
39049144353
-
Secrecy capacity of wireless channels
-
DOI 10.1109/ISIT.2006.261613, 4035982, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
J. Barros and M. R. D. Rodrigues, BSecrecy capacity of wireless channels,[ in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360. (Pubitemid 351244113)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
60
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lifeng, and H. El Gamal, BOn the secrecy capacity of fading channels,[ IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lifeng, L.2
El Gamal, H.3
-
61
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto ON Canada Jul. 6-11
-
F. Oggier and B. Hassibi, BThe secrecy capacity of the MIMO wiretap channel,[ in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 6-11, 2008, pp. 524-528.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
62
-
-
51649109883
-
On the secrecy capacity of fading wireless channel with multiple eavesdroppers
-
Nice, France, Jun. 24-29
-
P. Wang, G. Yu, and Z. Zhang, BOn the secrecy capacity of fading wireless channel with multiple eavesdroppers,[ in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007, pp. 1301-1305.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1301-1305
-
-
Wang, P.1
Yu, G.2
Zhang, Z.3
-
63
-
-
79956152661
-
Distributed coalition formation games for secure wireless transmission
-
Nov.
-
W. Saad, Z. Han, T. Basar, M. Debbah, and A. Hjørungnes, BDistributed coalition formation games for secure wireless transmission,[ Mobile Netw. Appl., vol. 16, no. 2, pp. 231-245, Nov. 2010.
-
(2010)
Mobile Netw. Appl
, vol.16
, Issue.2
, pp. 231-245
-
-
Saad, W.1
Han, Z.2
Basar, T.3
Debbah, M.4
Hjørungnes, A.5
-
64
-
-
84856161231
-
A survey on trust management for mobile Ad Hoc networks
-
First Quarter
-
J.-H. Cho, A. Swami, and I.-R. Chen, BA survey on trust management for mobile Ad Hoc networks,[ IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
-
(2009)
IEEE Commun. Surv. Tut
, vol.11
, Issue.1
, pp. 116-130
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.-R.3
-
65
-
-
78651526244
-
Game theoretic issues in cognitive radio systems
-
Nov
-
J. W. Huang and V. Krishnamurthy, BGame theoretic issues in cognitive radio systems,[ J. Commun., vol. 4, no. 10, pp. 790-802, Nov. 2009.
-
(2009)
J. Commun
, vol.4
, Issue.10
, pp. 790-802
-
-
Huang, J.W.1
Krishnamurthy, V.2
-
66
-
-
33847126272
-
Constrained bandwidth allocation in multi-sensor information fusion: A mechanism design approach
-
DOI 10.1109/ICIF.2005.1591991, 1591991, 2005 7th International Conference on Information Fusion, FUSION
-
R. K. Dash, A. Rogers, N. R. Jennings, S. Reece, and S. Roberts, BConstrained bandwidth allocation in multisensor information fusion: A mechanism design approach,[ in Proc. IEEE Inf. Fusion Conf., Philadelphia, PA, Jul. 2005, pp. 1185-1192. (Pubitemid 46276341)
-
(2005)
2005 7th International Conference on Information Fusion, FUSION
, vol.2
, pp. 1185-1192
-
-
Dash, R.K.1
Rogers, A.2
Jennings, N.R.3
Reece, S.4
Roberts, S.5
-
67
-
-
0032022195
-
On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas
-
G. J. Foschini and M. J. Gans, BOn limits of wireless communications in a fading environment when using multiple antennas,[ Wireless Pers. Commun., vol. 6, pp. 311-335, 1998. (Pubitemid 128513099)
-
(1998)
Wireless Personal Communications
, vol.6
, Issue.3
, pp. 311-335
-
-
Foschini, G.J.1
Gans, M.J.2
-
68
-
-
0032118152
-
Robust channel estimation for OFDM systems with rapid dispersive fading channels
-
PII S0090677898051691
-
Y. Li, L. J. Cimini, and N. R. Sollenberger, BRobust channel estimation for OFDM systems with rapid dispersive fading channels,[ IEEE Trans. Commun., vol. 46, no. 7, pp. 902-915, Jul. 1998. (Pubitemid 128739441)
-
(1998)
IEEE Transactions on Communications
, vol.46
, Issue.7
, pp. 902-915
-
-
Li, Y.1
Cimini Jr., L.J.2
Sollenberger, N.R.3
-
69
-
-
66249100554
-
Robust transmit power control for cognitive radio
-
May
-
P. Setoodeh and S. Haykin, BRobust transmit power control for cognitive radio,[ Proc. IEEE, vol. 97, no. 5, pp. 915-939, May 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.5
, pp. 915-939
-
-
Setoodeh, P.1
Haykin, S.2
-
70
-
-
77955687578
-
Robust cognitive radio via game theory
-
Jun
-
J. Wang, G. Scutari, and D. P. Palomar, BRobust cognitive radio via game theory,[ in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2010, pp. 2073-2077.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2073-2077
-
-
Wang, J.1
Scutari, G.2
Palomar, D.P.3
-
71
-
-
70449562880
-
Robust precoding for orthogonal space-time block coded MIMO cognitive radio networks
-
Perugia, Italy, Jun
-
M. H. Islam, Y.-C. Liang, and R. Zhang, BRobust precoding for orthogonal space-time block coded MIMO cognitive radio networks,[ in Proc. IEEE 10th Workshop Signal Process. Adv. Wireless Commun., Perugia, Italy, Jun. 2009, pp. 86-90.
-
(2009)
Proc. IEEE 10th Workshop Signal Process. Adv. Wireless Commun.
, pp. 86-90
-
-
Islam, M.H.1
Liang, Y.-C.2
Zhang, R.3
-
72
-
-
78349242932
-
MSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge
-
Elba Island, Italy, Jun.
-
X. Gong, A. Ishaque, G. Dartmann, and G. Ascheid, BMSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge,[ in Proc. 2nd Int. Workshop Cogn. Inf. Process., Elba Island, Italy, Jun. 2010, pp. 105-110.
-
(2010)
Proc. 2nd Int. Workshop Cogn. Inf. Process.
, pp. 105-110
-
-
Gong, X.1
Ishaque, A.2
Dartmann, G.3
Ascheid, G.4
-
73
-
-
76949103432
-
Robust beamforming in cognitive radio
-
Feb
-
G. Zheng, S. Ma, K.-K. Wong, and T.-S. Ng, BRobust beamforming in cognitive radio,[ IEEE Trans. Wireless Commun, vol. 9, no. 2, pp. 570-576, Feb. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.2
, pp. 570-576
-
-
Zheng, G.1
Ma, S.2
Wong, K.-K.3
Ng, T.-S.4
-
74
-
-
84855980633
-
Joint transceiver beamforming in MIMO cognitive radio network via second-order cone programming
-
Feb
-
H. Du, T. Ratnarajah, M. Pesavento, and C. B. Papadias, BJoint transceiver beamforming in MIMO cognitive radio network via second-order cone programming,[ IEEE Trans. Signal Process., vol. 60, no. 2, pp. 781-792, Feb. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.2
, pp. 781-792
-
-
Du, H.1
Ratnarajah, T.2
Pesavento, M.3
Papadias, C.B.4
-
75
-
-
80052158724
-
Distributed power control for cognitive radio networks, based on incumbent outage information
-
Kyoto, Japan, Jun DOI: 10.1109/icc.2011.5962937
-
O. Durowoju, K. Arshad, and K. Moessner, BDistributed power control for cognitive radio networks, based on incumbent outage information,[ in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, Jun. 2011, DOI: 10.1109/icc.2011.5962937.
-
(2011)
Proc. IEEE Int. Conf. Commun.
-
-
Durowoju, O.1
Arshad, K.2
Moessner, K.3
-
76
-
-
80052152643
-
Robust clustering of ad-hoc cognitive radio networks under opportunistic spectrum access
-
Kyoto, Japan, Jun DOI: 10.1109/icc.2011.5963426
-
D. Li and J. Gross, BRobust clustering of ad-hoc cognitive radio networks under opportunistic spectrum access,[ in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, Jun. 2011, DOI: 10.1109/icc.2011.5963426.
-
(2011)
Proc. IEEE Int. Conf. Commun.
-
-
Li, D.1
Gross, J.2
-
77
-
-
78651520951
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systemsVPart II: Unknown channel statistics
-
Jan
-
H. Li and Z. Han, BDogfight in spectrum: Combating primary user emulation attacks in cognitive radio systemsVPart II: Unknown channel statistics,[ IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 274-283, Jan. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.1
, pp. 274-283
-
-
Li, H.1
Han, Z.2
-
78
-
-
78449280420
-
Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks
-
Nov
-
H. Li and Z. Han, BCatch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks,[ IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3554-3565, Nov. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.9
, Issue.11
, pp. 3554-3565
-
-
Li, H.1
Han, Z.2
-
79
-
-
78649438641
-
BJoint sidelobe and peak power reduction in OFDM-based cognitive radio
-
San Francisco, CA, Sep 5-8 DOI: 10.1109/VETECF.2010.5594133
-
A. Ghassemi, L. H.-J. Lampe, A. Attar, and T. A. Gulliver, BJoint sidelobe and peak power reduction in OFDM-based cognitive radio,[ in Proc. IEEE Veh. Technol. Conf. Fall, San Francisco, CA, Sep. 5-8, 2011, DOI: 10.1109/VETECF.2010.5594133.
-
(2011)
Proc. IEEE Veh. Technol. Conf. Fall
-
-
Ghassemi, A.1
Lampe, L.H.-J.2
Attar, A.3
Gulliver T, A.4
|