메뉴 건너뛰기




Volumn , Issue , 2013, Pages 148-153

Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COGNITIVE RADIO; VIDEO STREAMING; WIRELESS NETWORKS;

EID: 84890827106     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4180/icst.crowncom.2013.252019     Document Type: Conference Paper
Times cited : (23)

References (27)
  • 1
    • 84876060752 scopus 로고    scopus 로고
    • Competition in wireless systems via bayesian inference games
    • 0709.0516
    • Adlakha, S., Johari, R., and Goldsmith, A., Competition in wireless systems via bayesian inference games. CoRR abs/0709.0516, 2007.
    • (2007) CoRR
    • Adlakha, S.1    Johari, R.2    Goldsmith, A.3
  • 2
    • 33745648091 scopus 로고    scopus 로고
    • Next generation /dynamic spectrum access/ cognitive radio wireless networks: A survey
    • 50
    • Akyildiz, I.F., Lee, W.Y., Vuran, M.C., and Mohanty, S., Next generation /dynamic spectrum access/ cognitive radio wireless networks: a survey. Computer Networks,50, 2127-2159, 2006.
    • (2006) Computer Networks , pp. 2127-2159
    • Akyildiz, I.F.1    Lee, W.Y.2    Vuran, M.C.3    Mohanty, S.4
  • 3
    • 52549109488 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • 13
    • Brown, T.X., Sethi, A., Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment. Mobile Networks and Applications, 13, 516-532, 2008.
    • (2008) Mobile Networks and Applications , pp. 516-532
    • Brown, T.X.1    Sethi, A.2
  • 7
    • 0031161887 scopus 로고    scopus 로고
    • On a Ruckle problem in discrete games of ambush
    • 44
    • Garnaev, A., On a Ruckle problem in discrete games of ambush. Naval Research Logistics, 44, 353-364, 1997.
    • (1997) Naval Research Logistics , pp. 353-364
    • Garnaev, A.1
  • 10
    • 85184305615 scopus 로고    scopus 로고
    • Dependence of optimal monitoring strategy on the application to be protected
    • Garnaev, A., Trappe, W., and Kung, C.-T., Dependence of Optimal Monitoring Strategy on the Application to be Protected. IEEE GlobeCom 2012, pp. 1072-1077.
    • (2012) IEEE GlobeCom , pp. 1072-1077
    • Garnaev, A.1    Trappe, W.2    Kung, C.3
  • 12
    • 77951128892 scopus 로고    scopus 로고
    • A minmax game of power control in a wireless network under incomplete information
    • Heikkinen, T., A Minmax Game of Power Control in a Wireless Network under Incomplete Information. DIMACS Tech. Report 99-43, 1999.
    • (1999) DIMACS Tech. Report , pp. 99-43
    • Heikkinen, T.1
  • 14
    • 70349696172 scopus 로고    scopus 로고
    • Aldo: An anomaly detection framework for dynamic spectrum access networks
    • Liu, S., Chen, Y., Trappe, W., and Greenstein, L.J., Aldo: An anomaly detection framework for dynamic spectrum access networks. INFOCOM 2009.
    • (2009) INFOCOM
    • Liu, S.1    Chen, Y.2    Trappe, W.3    Greenstein, L.J.4
  • 16
    • 0004260006 scopus 로고
    • W.B. Sanders, Philadelphia
    • Owen, G., Game Theory. W.B.Sanders, Philadelphia, 1982.
    • (1982) Game Theory
    • Owen, G.1
  • 17
    • 51749122504 scopus 로고
    • Energy detection of unknown deterministic signals
    • 55
    • Urkowitz, H., Energy detection of unknown deterministic signals. Proceedings of the IEEE, 55, 523-531, 1967.
    • (1967) Proceedings of the IEEE , pp. 523-531
    • Urkowitz, H.1
  • 20
    • 77956266464 scopus 로고    scopus 로고
    • Game theory for cognitive radio networks: An overview
    • Wang, B., Wu, Y., and Liu, K.J., Game theory for cognitive radio networks: An overview. Computer Networks, 54, 2537-2561, 2010.
    • (2010) Computer Networks , vol.54 , pp. 2537-2561
    • Wang, B.1    Wu, Y.2    Liu, K.J.3
  • 22
    • 84856969548 scopus 로고    scopus 로고
    • Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    • Zhu, Q., Saad, W., Han. Z., Poor, H.V., and Basar, T., Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach. MILCOM 2011.
    • (2011) MILCOM
    • Zhu, Q.1    Saad, W.2    Han, Z.3    Poor, H.V.4    Basar, T.5
  • 23
    • 63749110244 scopus 로고    scopus 로고
    • A game-theoretic analysis of denial of service attacks in wireless random access
    • 15
    • Sagduyu,Y.E., and Ephremides, A., A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access. Journal of Wireless Networks, 15, 651-666, 2009.
    • (2009) Journal of Wireless Networks , pp. 651-666
    • Sagduyu, Y.E.1    Ephremides, A.2
  • 24
    • 84869597150 scopus 로고    scopus 로고
    • Jamming game in a dynamic slotted ALOHA network
    • Garnaev A., Hayel Y., Altman E., and Avrachenkov K., Jamming Game in a Dynamic Slotted ALOHA Network. GameNets 2011, pp. 429-443.
    • (2011) GameNets , pp. 429-443
    • Garnaev, A.1    Hayel, Y.2    Altman, E.3    Avrachenkov, K.4
  • 25
    • 84890820289 scopus 로고    scopus 로고
    • Combined power control and transmission selection in cellular networks
    • Kim, S.L., Rosberg, Z., and Zander, J., Combined power control and transmission selection in cellular networks. IEEE VTC 1999.
    • (1999) IEEE VTC
    • Kim, S.L.1    Rosberg, Z.2    Zander, J.3
  • 26
    • 0032658512 scopus 로고    scopus 로고
    • Analysis of Erlang capacity for the multimedia DS-CDMA systems
    • Koo, I., Ahn, J., Lee, H.A., and Kim, K.,Analysis of Erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals, E82-A(5), pp.849-855, 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.5 , pp. 849-855
    • Koo, I.1    Ahn, J.2    Lee, H.A.3    Kim, K.4
  • 27
    • 84890816230 scopus 로고    scopus 로고
    • The eavesdropping and jamming dilemma in multi-channel communications
    • Garnaev A., Trappe W., The Eavesdropping and Jamming Dilemma in Multi-Channel Communications. IEEE ICC 2013.
    • (2013) IEEE ICC
    • Garnaev, A.1    Trappe, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.