메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2846-2851

Classifier selection for physical layer security augmentation in Cognitive Radio networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COGNITIVE RADIO; DISCRIMINANT ANALYSIS; NETWORK LAYERS; VECTOR QUANTIZATION; WIRELESS NETWORKS;

EID: 84891370562     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2013.6654972     Document Type: Conference Paper
Times cited : (28)

References (32)
  • 4
    • 84867518059 scopus 로고    scopus 로고
    • A survey on security threats and detection techniques in cognitive radio networks
    • A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks, " IEEE Communications Surveys Tutorials, vol. PP, no. 99, pp. 1 -18, 2012.
    • (2012) IEEE Communications Surveys Tutorials , vol.PP , Issue.99 , pp. 1-18
    • Fragkiadakis, A.1    Tragos, E.2    Askoxylakis, I.3
  • 6
    • 84857196656 scopus 로고    scopus 로고
    • On identifying primary user emulation attacks in cognitive radio systems using nonparametric bayesian classification
    • Mar
    • N. Nguyen, R. Zheng, and Z. Han, "On identifying primary user emulation attacks in cognitive radio systems using nonparametric bayesian classification, " Signal Processing, IEEE Transactions on, vol. 60, no. 3, pp. 1432 -1445, Mar 2012.
    • (2012) Signal Processing, IEEE Transactions on , vol.60 , Issue.3 , pp. 1432-1445
    • Nguyen, N.1    Zheng, R.2    Han, Z.3
  • 8
    • 74549164806 scopus 로고    scopus 로고
    • Application of wavelet-based rf fingerprinting to enhance wireless network security
    • Dec
    • R.W. Klein, et al., "Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security, " Jour of Communications and Networks, vol. 11, no. 6, pp. 544-555, Dec 2009.
    • (2009) Jour of Communications and Networks , vol.11 , Issue.6 , pp. 544-555
    • Klein, R.W.1
  • 11
    • 55449093152 scopus 로고    scopus 로고
    • Rf fingerprinting commercial communication devices to enhance electronic security
    • Oct
    • W.C. Suski, et al., "RF Fingerprinting Commercial Communication Devices to Enhance Electronic Security, " Int. J. Electronic Security and Digital Forensics, vol. 1, no. 3, pp. 301-322, Oct 2008.
    • (2008) Int. J. Electronic Security and Digital Forensics , vol.1 , Issue.3 , pp. 301-322
    • Suski, W.C.1
  • 12
    • 84255170037 scopus 로고    scopus 로고
    • 4G security using physical layer rf-dna with de-optimized lfs classification
    • P.K. Harmer, et al., "4G Security Using Physical Layer RF-DNA with DE-Optimized LFS Classification, " Jour of Communications Networks, vol. 6, no. 9, pp. 671-681, 2011.
    • (2011) Jour of Communications Networks , vol.6 , Issue.9 , pp. 671-681
    • Harmer, P.K.1
  • 13
    • 77950633052 scopus 로고    scopus 로고
    • Improved wireless security for gmsk-based devices using rf fingerprinting
    • Mar
    • D.R. Reising, et al., "Improved Wireless Security for GMSK-Based Devices Using RF Fingerprinting, " Int. J. Electronic Security and Digital Forensics, vol. 3, no. 1, pp. 41-59, Mar 2010.
    • (2010) Int. J. Electronic Security and Digital Forensics , vol.3 , Issue.1 , pp. 41-59
    • Reising, D.R.1
  • 14
    • 79551618218 scopus 로고    scopus 로고
    • Augmenting bit-level network security using physical layer rf-dna fingerprinting
    • Dec
    • M.D. Williams, et al., "Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting, " in IEEE Global Communications Conf, Dec 2010.
    • (2010) IEEE Global Communications Conf
    • Williams, M.D.1
  • 17
    • 84871958141 scopus 로고    scopus 로고
    • Wimax mobile subscriber verification using gabor-based rf-dna fingerprints
    • Jun
    • D.R. Reising, et al, "WiMAX Mobile Subscriber Verification Using Gabor-Based RF-DNA Fingerprints, " in 2012 IEEE Int'l Conf on Communications (ICC12), Jun 2012.
    • (2012) 2012 IEEE Int'l Conf on Communications (ICC12)
    • Reising, D.R.1
  • 18
    • 38049181728 scopus 로고    scopus 로고
    • Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
    • J. Hall, et al., "Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting, " in Communications and Computer Networks, 2006, pp. 108-113.
    • (2006) Communications and Computer Networks , pp. 108-113
    • Hall, J.1
  • 21
    • 42549151882 scopus 로고    scopus 로고
    • Relevance-based feature extraction for hyperspectral images
    • Apr
    • M.J. Mendenhall and E. Merenyi, "Relevance-Based Feature Extraction for Hyperspectral Images, " Neural Networks, IEEE Transactions on, vol. 19, no. 4, pp. 658-672, Apr 2008.
    • (2008) Neural Networks, IEEE Transactions on , vol.19 , Issue.4 , pp. 658-672
    • Mendenhall, M.J.1    Merenyi, E.2
  • 22
    • 0036791938 scopus 로고    scopus 로고
    • Generalized relevance learning vector quantization
    • B. Hammer and T. Villmann, "Generalized Relevance Learning Vector Quantization, " Neural Networks, vol. 15, pp. 1059-1068, 2002.
    • (2002) Neural Networks , vol.15 , pp. 1059-1068
    • Hammer, B.1    Villmann, T.2
  • 30
    • 0034244855 scopus 로고    scopus 로고
    • Adaptive metric kernel regression
    • C. Goutte and J. Larsen, "Adaptive Metric Kernel Regression, " J. of VLSI Signal Processing, vol. 26, no. 1/2, pp. 155-167, 2000.
    • (2000) J. of VLSI Signal Processing , vol.26 , Issue.1-2 , pp. 155-167
    • Goutte, C.1    Larsen, J.2
  • 32
    • 0024123145 scopus 로고
    • Adding a conscience to competitive learning
    • Jul
    • D. DeSieno, "Adding a Conscience to Competitive Learning." in Proc. IEEE Int'l Conf Neural Network I, Jul 1988, pp.117-124.
    • (1988) Proc. IEEE Int'l Conf Neural Network I , pp. 117-124
    • Desieno, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.