-
1
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
Sept
-
I. F. Akyildiz et al., "NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey," ACM Int'l. J. Computer and Telecommun. Net., vol. 50, issue 13, Sept. 2006, pp. 2127-59.
-
(2006)
ACM int'L. J. Computer and Telecommun. Net
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
-
3
-
-
0017996501
-
The gaussian wiretap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian Wiretap Channel," IEEE Trans. Info. Theory, vol. 24, no. 4, July 1978, pp. 451-56.
-
(1978)
IEEE Trans. Info. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
84859393431
-
Link adaptation for physical layer security over wireless fading channels
-
H. Khodakarami and F. Lahouti, "Link Adaptation for Physical Layer Security Over Wireless Fading Channels," IET Commun., vol. 6, issue 3, 2012, pp. 353-62.
-
(2012)
IET Commun
, vol.6
, Issue.3
, pp. 353-362
-
-
Khodakarami, H.1
Lahouti, F.2
-
5
-
-
77951855384
-
Securing cognitive radio networks
-
O. Leon, J. H. Serrano and M. Soriano, "Securing Cognitive Radio Networks," Int'l. J. Commun. Systems, vol. 23, 2010, pp. 633-52.
-
(2010)
Int'L. J. Commun. Systems
, vol.23
, pp. 633-652
-
-
Leon, O.1
Serrano, J.H.2
Soriano, M.3
-
6
-
-
80052406591
-
Survey of security issues in cognitive radio networks
-
W. El-Hajj, H. Safa, and M. Guizani, "Survey of Security Issues in Cognitive Radio Networks," J. Internet Tech., vol. 12, no. 2, 2011, pp. 25-37.
-
(2011)
J. Internet Tech
, vol.12
, Issue.2
, pp. 25-37
-
-
El-Hajj, W.1
Safa, H.2
Guizani, M.3
-
7
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
R. Chen, J. M. Park, and J. H. Reed, "Defense Against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE JSAC, vol. 26, issue 1, 2008, pp. 25-37.
-
(2008)
IEEE JSAC
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.M.2
Reed, J.H.3
-
8
-
-
77950149514
-
Security in cognitive radio networks: Threats and mitigation
-
May
-
T. C. Clancy, and N. Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation," IEEE Crowncom, May. 2008, pp. 1-8.
-
(2008)
IEEE Crowncom
, pp. 1-8
-
-
Clancy, T.C.1
Goergen, N.2
-
9
-
-
42649135628
-
Toward secure distributed spectrum sensing in cognitive radio networks
-
R. Chen et al., "Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks," IEEE Commun. Mag., vol. 46, no. 4, 2008, pp. 50-55.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.4
, pp. 50-55
-
-
Chen, R.1
-
10
-
-
40949158575
-
Multi-channel jamming attacks using cognitive radios
-
Aug
-
A. Sampath, H. Dai, H. Zheng, and B. Y. Zhao, "Multi-channel Jamming Attacks using Cognitive Radios," IEEE ICCCN, Aug. 2007, pp. 352-57.
-
(2007)
IEEE ICCCN
, pp. 352-357
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.Y.4
-
11
-
-
11244260535
-
Channel surfng and spatial retreats: Defenses against wireless denial of service
-
Philadelphia, PA Jan
-
W. Xu et al., "Channel Surfng and Spatial Retreats: Defenses Against Wireless Denial of Service," Proc. 3rd ACM Wksp. Wireless Security, Philadelphia, PA, Jan. 2004, pp. 80-89.
-
(2004)
Proc. 3rd ACM Wksp. Wireless Security
, pp. 80-89
-
-
Xu, W.1
-
12
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
June
-
L. Zhang et al., "On the Relationship Between the Multi-Antenna Secrecy Communications and Cognitive Radio Communications," IEEE Trans. Commun., vol. 58, issue 6, June 2010, pp. 1877-86.
-
(2010)
IEEE Trans. Commun
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
-
13
-
-
84863127299
-
Impact of interference on secrecy capacity in a cognitive radio network
-
Houston, TX, Dec
-
Z. Shu et al., "Impact of Interference on Secrecy Capacity in a Cognitive Radio Network," Proc. IEEE Globecom 2011, Houston, TX, Dec. 2011.
-
(2011)
Proc. IEEE Globecom 2011
-
-
Shu, Z.1
|