-
1
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
Sept
-
I. F. Akyildiz et al., "Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey," Comput. Net., vol. 50, no. 13, Sept. 2006, pp. 2127-59.
-
(2006)
Comput. Net
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
-
2
-
-
84869508857
-
A survey of security challenges in cognitive radio networks: Solutions and future research directions
-
A. Attar et al., "A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions," Proc. IEEE, no. 99, 2012, pp. 1-15.
-
(2012)
Proc. IEEE
, Issue.99
, pp. 1-15
-
-
Attar, A.1
-
3
-
-
79953208302
-
Control channel establishment in cognitive radio networks using channel hopping
-
Apr
-
K. Bian, J.-M. Park, and R. Chen, "Control Channel Establishment in Cognitive Radio Networks Using Channel Hopping," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 689-703.
-
(2011)
IEEE JSAC
, vol.29
, Issue.4
, pp. 689-703
-
-
Bian, K.1
Park, J.-M.2
Chen, R.3
-
4
-
-
57549101228
-
Secure communication over radio channels
-
New York, NY, USA: ACM
-
S. Dolev et al., "Secure Communication Over Radio Channels," Proc. 27th ACM Symp. Principles of Distributed Computing, ser. PODC '08, New York, NY, USA: ACM, 2008, pp. 105-14.
-
(2008)
Proc. 27th ACM Symp. Principles of Distributed Computing, Ser. PODC '08
, pp. 105-114
-
-
Dolev, S.1
-
5
-
-
84872115312
-
COKE: Crypto-less over-the-air key establishment
-
Jan
-
R. Di Pietro and G. Oligeri, "COKE: Crypto-Less over-the-Air Key Establishment," IEEE Trans. Info. Forensics and Security, vol. 8, no. 1, Jan. 2013, pp. 163-73.
-
(2013)
IEEE Trans. Info. Forensics and Security
, vol.8
, Issue.1
, pp. 163-173
-
-
Di Pietro, R.1
Oligeri, G.2
-
6
-
-
84879120141
-
United we stand: Intrusion-resilience in mobile unattended WSNs
-
no. PrePrints
-
R. Di Pietro et al., "United We Stand: Intrusion-Resilience in Mobile Unattended WSNs," IEEE Trans. Mobile Computing, vol. 99, no. PrePrints, 2012.
-
(2012)
IEEE Trans. Mobile Computing
, vol.99
-
-
Di Pietro, R.1
-
7
-
-
79953224848
-
Spoofing or jamming: Performance analysis of a tactical cognitive radio adversary
-
Apr
-
Q. Peng, P. Cosman, and L. Milstein, "Spoofing or Jamming: Performance Analysis of A Tactical Cognitive Radio Adversary," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 903-11
-
(2011)
IEEE JSAC
, vol.29
, Issue.4
, pp. 903-911
-
-
Peng, Q.1
Cosman, P.2
Milstein, L.3
-
8
-
-
79953200186
-
An anti-jamming stochastic game for cognitive radio networks
-
Apr
-
B. Wang et al., "An Anti-Jamming Stochastic Game for Cognitive Radio Networks," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 877-89.
-
(2011)
IEEE JSAC
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
-
9
-
-
80051902256
-
Thwarting inside jamming attacks on wireless broadcast communications
-
S. Liu, L. Lazos, and M. Krunz, "Thwarting Inside Jamming Attacks on Wireless Broadcast Communications," WISEC, 2011, pp. 29-40.
-
(2011)
WISEC
, pp. 29-40
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
10
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
New York, NY, USA: ACM
-
W. Xu et al., "Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service," Proc. 3rd ACM Wksp. Wireless Security, ser. WiSe '04, New York, NY, USA: ACM, 2004, pp. 80-89.
-
(2004)
Proc. 3rd ACM Wksp. Wireless Security, Ser. WiSe '04
, pp. 80-89
-
-
Xu, W.1
-
11
-
-
77955813118
-
Jenna: A jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks
-
Aug
-
A. Asterjadhi and M. Zorzi, "Jenna: A Jamming Evasive Network-Coding Neighbor-Discovery Algorithm for Cognitive Radio Networks," Wireless Commun., vol. 17, no. 4, Aug. 2010, pp. 24-32.
-
(2010)
Wireless Commun
, vol.17
, Issue.4
, pp. 24-32
-
-
Asterjadhi, A.1
Zorzi, M.2
-
12
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part I: Known channel statistics
-
Nov
-
H. Li and Z. Han, "Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics," Trans. Wireless. Commun., vol. 9, no. 11, Nov. 2010, pp. 3566-77.
-
(2010)
Trans. Wireless. Commun
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
13
-
-
84855466075
-
Anti-jamming games in multi-channel cognitive radio networks
-
Y. Wu et al., "Anti-Jamming Games in Multi-Channel Cognitive Radio Networks," IEEE JSAC, vol. 30, no. 1, 2012, pp. 4-15.
-
(2012)
IEEE JSAC
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
-
14
-
-
79960882539
-
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
-
June
-
C. Popper, M. Strasser, and S. Capkun, "Anti-Jamming Broadcast Communication Using Uncoordinated Spread Spectrum Techniques," IEEE JSAC, vol. 28, no. 5, June 2010, pp. 703-15.
-
(2010)
IEEE JSAC
, vol.28
, Issue.5
, pp. 703-715
-
-
Popper, C.1
Strasser, M.2
Capkun, S.3
-
15
-
-
48749133065
-
Keyless jam resistance
-
IEEE SMC, June
-
L. Baird et al., "Keyless Jam Resistance," Information Assurance and Security Wksp., 2007. IAW '07, IEEE SMC, June 2007, pp. 143-50.
-
(2007)
Information Assurance and Security Wksp., 2007. IAW '07
, pp. 143-150
-
-
Baird, L.1
-
16
-
-
70350641370
-
The wireless synchronization problem
-
New York, NY, USA: ACM
-
S. Dolev et al., "The Wireless Synchronization Problem," Proc. 28th ACM Symp. Principles of Distributed Computing, ser. PODC '09, New York, NY, USA: ACM, 2009, pp. 190-99.
-
(2009)
Proc. 28th ACM Symp. Principles of Distributed Computing, Ser. PODC '09
, pp. 190-199
-
-
Dolev, S.1
-
17
-
-
0035364292
-
Energy-efficient permutation routing in radio networks
-
June
-
K. Nakano, S. Olariu, and A. Zomaya, "Energy-Efficient Permutation Routing in Radio Networks," IEEE Trans. Parallel and Distributed Systems, vol. 12, no. 6, June 2001, pp. 544-57.
-
(2001)
IEEE Trans. Parallel and Distributed Systems
, vol.12
, Issue.6
, pp. 544-557
-
-
Nakano, K.1
Olariu, S.2
Zomaya, A.3
|