-
3
-
-
78951495035
-
Advances in cr networks: A survey
-
B. Wang and K. Liu, "Advances in CR Networks: A Survey, " IEEE Jour of Sel Topics in Signal Processing, vol. 5, no. 1, pp. 5-23, 2011.
-
(2011)
IEEE Jour of Sel Topics in Signal Processing
, vol.5
, Issue.1
, pp. 5-23
-
-
Wang, B.1
Liu, K.2
-
4
-
-
84867518059
-
A survey on security threats and detection techniques in cognitive radio networks
-
A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks, " IEEE Communications Surveys Tutorials, vol. PP, no. 99, pp. 1 -18, 2012.
-
(2012)
IEEE Communications Surveys Tutorials
, vol.PP
, Issue.99
, pp. 1-18
-
-
Fragkiadakis, A.1
Tragos, E.2
Askoxylakis, I.3
-
5
-
-
84857217036
-
Detecting primary user emulation attack in cognitive radio networks
-
Dec
-
D. Pu, Y. Shi, A. Ilyashenko, and A. Wyglinski, "Detecting primary user emulation attack in cognitive radio networks, " in Global Telecommunications Conference (GLOBECOM 2011), Dec 2011.
-
(2011)
Global Telecommunications Conference (GLOBECOM 2011)
-
-
Pu, D.1
Shi, Y.2
Ilyashenko, A.3
Wyglinski, A.4
-
6
-
-
84857196656
-
On identifying primary user emulation attacks in cognitive radio systems using nonparametric bayesian classification
-
Mar
-
N. Nguyen, R. Zheng, and Z. Han, "On identifying primary user emulation attacks in cognitive radio systems using nonparametric bayesian classification, " Signal Processing, IEEE Transactions on, vol. 60, no. 3, pp. 1432 -1445, Mar 2012.
-
(2012)
Signal Processing, IEEE Transactions on
, vol.60
, Issue.3
, pp. 1432-1445
-
-
Nguyen, N.1
Zheng, R.2
Han, Z.3
-
7
-
-
60149092949
-
Wireless device id with radiometric signatures
-
New York, NY, USA: ACM
-
V. Brik, et al., "Wireless Device ID with Radiometric Signatures, " in Proc of the 14th ACM Int'l Conf on Mobile computing and networking, ser. MobiCom '08. New York, NY, USA: ACM, 2008, pp. 116-127.
-
(2008)
Proc of the 14th ACM Int'l Conf on Mobile Computing and Networking, Ser. MobiCom '08
, pp. 116-127
-
-
Brik, V.1
-
8
-
-
74549164806
-
Application of wavelet-based rf fingerprinting to enhance wireless network security
-
Dec
-
R.W. Klein, et al., "Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security, " Jour of Communications and Networks, vol. 11, no. 6, pp. 544-555, Dec 2009.
-
(2009)
Jour of Communications and Networks
, vol.11
, Issue.6
, pp. 544-555
-
-
Klein, R.W.1
-
9
-
-
37749006403
-
802.11 User fingerprinting
-
New York, NY, USA: ACM
-
J. Pang, et al., "802.11 User Fingerprinting, " in 13th Annual ACM Int'l Conf on Mobile Computing and Networking (MOBICOM07). New York, NY, USA: ACM, 2007, pp. 99-110.
-
(2007)
13th Annual ACM Int'l Conf on Mobile Computing and Networking (MOBICOM07)
, pp. 99-110
-
-
Pang, J.1
-
10
-
-
77955713637
-
-
D. Takahashi, et al., "IEEE 802.11 Fingerprinting and Its Applications for Intrusion Detection, " vol. 60, no. 2, pp. 307-318, 2010.
-
(2010)
IEEE 802.11 Fingerprinting and Its Applications for Intrusion Detection
, vol.60
, Issue.2
, pp. 307-318
-
-
Takahashi, D.1
-
11
-
-
55449093152
-
Rf fingerprinting commercial communication devices to enhance electronic security
-
Oct
-
W.C. Suski, et al., "RF Fingerprinting Commercial Communication Devices to Enhance Electronic Security, " Int. J. Electronic Security and Digital Forensics, vol. 1, no. 3, pp. 301-322, Oct 2008.
-
(2008)
Int. J. Electronic Security and Digital Forensics
, vol.1
, Issue.3
, pp. 301-322
-
-
Suski, W.C.1
-
12
-
-
84255170037
-
4G security using physical layer rf-dna with de-optimized lfs classification
-
P.K. Harmer, et al., "4G Security Using Physical Layer RF-DNA with DE-Optimized LFS Classification, " Jour of Communications Networks, vol. 6, no. 9, pp. 671-681, 2011.
-
(2011)
Jour of Communications Networks
, vol.6
, Issue.9
, pp. 671-681
-
-
Harmer, P.K.1
-
13
-
-
77950633052
-
Improved wireless security for gmsk-based devices using rf fingerprinting
-
Mar
-
D.R. Reising, et al., "Improved Wireless Security for GMSK-Based Devices Using RF Fingerprinting, " Int. J. Electronic Security and Digital Forensics, vol. 3, no. 1, pp. 41-59, Mar 2010.
-
(2010)
Int. J. Electronic Security and Digital Forensics
, vol.3
, Issue.1
, pp. 41-59
-
-
Reising, D.R.1
-
14
-
-
79551618218
-
Augmenting bit-level network security using physical layer rf-dna fingerprinting
-
Dec
-
M.D. Williams, et al., "Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting, " in IEEE Global Communications Conf, Dec 2010.
-
(2010)
IEEE Global Communications Conf
-
-
Williams, M.D.1
-
17
-
-
84871958141
-
Wimax mobile subscriber verification using gabor-based rf-dna fingerprints
-
Jun
-
D.R. Reising, et al, "WiMAX Mobile Subscriber Verification Using Gabor-Based RF-DNA Fingerprints, " in 2012 IEEE Int'l Conf on Communications (ICC12), Jun 2012.
-
(2012)
2012 IEEE Int'l Conf on Communications (ICC12)
-
-
Reising, D.R.1
-
18
-
-
38049181728
-
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
-
J. Hall, et al., "Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting, " in Communications and Computer Networks, 2006, pp. 108-113.
-
(2006)
Communications and Computer Networks
, pp. 108-113
-
-
Hall, J.1
-
20
-
-
84891357825
-
Phy-layer id of uhf rfid tags
-
New York, NY, USA: ACM
-
D. Zanetti, et al., "PHY-Layer ID of UHF RFID Tags, " in Proc of 16th Annual Int'l Conf on Mobile Computing and Networking, ser. MobiCom '10. New York, NY, USA: ACM, 2010, pp. 353-364.
-
(2010)
Proc of 16th Annual Int'l Conf on Mobile Computing and Networking, Ser. MobiCom '10
, pp. 353-364
-
-
Zanetti, D.1
-
21
-
-
42549151882
-
Relevance-based feature extraction for hyperspectral images
-
Apr
-
M.J. Mendenhall and E. Merenyi, "Relevance-Based Feature Extraction for Hyperspectral Images, " Neural Networks, IEEE Transactions on, vol. 19, no. 4, pp. 658-672, Apr 2008.
-
(2008)
Neural Networks, IEEE Transactions on
, vol.19
, Issue.4
, pp. 658-672
-
-
Mendenhall, M.J.1
Merenyi, E.2
-
22
-
-
0036791938
-
Generalized relevance learning vector quantization
-
B. Hammer and T. Villmann, "Generalized Relevance Learning Vector Quantization, " Neural Networks, vol. 15, pp. 1059-1068, 2002.
-
(2002)
Neural Networks
, vol.15
, pp. 1059-1068
-
-
Hammer, B.1
Villmann, T.2
-
26
-
-
0003684449
-
-
Springer-Verlag, New York, USA
-
T. Hastie, et al., The Elements of Statistical Learning; Data Mining, Inference, and Prediction. Springer-Verlag, New York, USA, 2001.
-
(2001)
The Elements of Statistical Learning; Data Mining, Inference, and Prediction
-
-
Hastie, T.1
-
28
-
-
0003890671
-
-
2nd ed. Hoboken, HJ: Wiley & Sons
-
V. S. Cherkassky and F. Mulier, Learning From Data: Concepts, Theory, and Methods, 2nd ed. Hoboken, HJ: Wiley & Sons, 2007.
-
(2007)
Learning from Data: Concepts, Theory, and Methods
-
-
Cherkassky, V.S.1
Mulier, F.2
-
30
-
-
0034244855
-
Adaptive metric kernel regression
-
C. Goutte and J. Larsen, "Adaptive Metric Kernel Regression, " J. of VLSI Signal Processing, vol. 26, no. 1/2, pp. 155-167, 2000.
-
(2000)
J. of VLSI Signal Processing
, vol.26
, Issue.1-2
, pp. 155-167
-
-
Goutte, C.1
Larsen, J.2
-
32
-
-
0024123145
-
Adding a conscience to competitive learning
-
Jul
-
D. DeSieno, "Adding a Conscience to Competitive Learning." in Proc. IEEE Int'l Conf Neural Network I, Jul 1988, pp.117-124.
-
(1988)
Proc. IEEE Int'l Conf Neural Network I
, pp. 117-124
-
-
Desieno, D.1
|