-
1
-
-
77956621711
-
-
U.S. Federal Communications Commission (FCC) [Online]
-
U.S. Federal Communications Commission (FCC) "National broadband plan: Connecting America, " 2010. [Online]. Available: http://www. broadband.gov/plan/.
-
(2010)
National Broadband Plan: Connecting America
-
-
-
11
-
-
84858267848
-
Developing a standard for TV white space coexistence: Technical challenges and solution approaches
-
Feb.
-
T. Baykas, M. Kasslin, M. Cummings, H. Kang, J. Kwak, R. Paine, A. Reznik, and R. Saeed, "Developing a standard for TV white space coexistence: Technical challenges and solution approaches, " IEEE Wireless Commun., vol. 19, no. 1, pp. 10-22, Feb. 2012.
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.1
, pp. 10-22
-
-
Baykas, T.1
Kasslin, M.2
Cummings, M.3
Kang, H.4
Kwak, J.5
Paine, R.6
Reznik, A.7
Saeed, R.8
-
12
-
-
57849119700
-
Geo-location database techniques for incumbent protection in the TV white space
-
DOI: 10.1109/DYSPAN.2008.31
-
D. Gurney, G. Buchwald, L. Ecklund, S. Kuffner, and J. Grosspietsch, "Geo-location database techniques for incumbent protection in the TV white space, " in Proc. IEEE Symp. New Frontiers Dyn. Spectrum Access Netw., 2008, DOI: 10.1109/DYSPAN.2008.31.
-
(2008)
Proc. IEEE Symp. New Frontiers Dyn. Spectrum Access Netw.
-
-
Gurney, D.1
Buchwald, G.2
Ecklund, L.3
Kuffner, S.4
Grosspietsch, J.5
-
13
-
-
84555187531
-
Senseless: A database-driven white spaces network
-
R. Murty, R. Chandra, T. Moscibroda, and P. Bahl, "Senseless: A database-driven white spaces network, " IEEE Trans. Mobile Comput., vol. 11, no. 2, pp. 189-203, 2012.
-
(2012)
IEEE Trans. Mobile Comput.
, vol.11
, Issue.2
, pp. 189-203
-
-
Murty, R.1
Chandra, R.2
Moscibroda, T.3
Bahl, P.4
-
14
-
-
21644436295
-
Implementation issues in spectrum sensing for cognitive radios
-
Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers
-
D. Cabric, S. Mishra, and R. Brodersen, "Implementation issues in spectrum sensing for cognitive radios, " in Proc. Asilomar Conf. Signals Syst. Comput., 2004, vol. 1, pp. 772-776. (Pubitemid 40930707)
-
(2004)
Conference Record - Asilomar Conference on Signals, Systems and Computers
, vol.1
, pp. 772-776
-
-
Cabric, D.1
Mishra, S.M.2
Brodersen, R.W.3
-
15
-
-
70349185618
-
A survey of spectrum sensing algorithms for cognitive radio applications
-
First Quarter
-
T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications, " IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
-
(2009)
IEEE Commun. Surv. Tut.
, vol.11
, Issue.1
, pp. 116-130
-
-
Yucek, T.1
Arslan, H.2
-
16
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug.
-
J. Mitola, J. Maguire, and G. Q., "Cognitive radio: Making software radios more personal, " IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
-
(1999)
IEEE Pers. Commun.
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola, J.1
Maguire, J.2
-
17
-
-
84861330060
-
Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
-
2nd Qtr.
-
G. Baldini, T. Sturman, A. Biswas, R. Leschhorn, G. Godor, and M. Street, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead, " IEEE Commun. Surv. Tut., vol. 14, no. 2, pp. 355-379R 2nd Qtr., 2012.
-
(2012)
IEEE Commun. Surv. Tut.
, vol.14
, Issue.2
-
-
Baldini, G.1
Sturman, T.2
Biswas, A.3
Leschhorn, R.4
Godor, G.5
Street, M.6
-
18
-
-
84867492061
-
Cognitive radio network security: A survey
-
S. Parvin, F. K. Hussain, O. K. Hussain, S. Han, B. Tian, and E. Chang, "Cognitive radio network security: A survey, " J. Netw. Comput. Appl., vol. 35, no. 6, pp. 1691-1708, 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.6
, pp. 1691-1708
-
-
Parvin, S.1
Hussain, F.K.2
Hussain, O.K.3
Han, S.4
Tian, B.5
Chang, E.6
-
19
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.3
-
21
-
-
79551652585
-
Case study: Security analysis of a dynamic spectrum access radio system
-
DOI: 10.1109/GLOCOM.2010.5683726
-
T. Newman, T. Clancy, M. McHenry, and J. Reed, "Case study: Security analysis of a dynamic spectrum access radio system, " in Proc. IEEE Global Telecommun. Conf., 2010, DOI: 10.1109/GLOCOM.2010.5683726.
-
(2010)
Proc. IEEE Global Telecommun. Conf.
-
-
Newman, T.1
Clancy, T.2
McHenry, M.3
Reed, J.4
-
22
-
-
51349154337
-
Robust distributed spectrum sensing in cognitive radio networks
-
R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks, " in Proc. IEEE Conf. Comput. Commun., 2008, pp. 1876-1884.
-
(2008)
Proc. IEEE Conf. Comput. Commun.
, pp. 1876-1884
-
-
Chen, R.1
Park, J.-M.2
Bian, K.3
-
23
-
-
78651372721
-
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
-
Feb.
-
A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, " IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.2
, pp. 774-786
-
-
Rawat, A.1
Anand, P.2
Chen, H.3
Varshney, P.4
-
24
-
-
67349109723
-
A survey on MAC protocols for cognitive radio networks
-
C. Cormio and K. R. Chowdhury, "A survey on MAC protocols for cognitive radio networks, " Ad Hoc Netw., vol. 7, no. 7, pp. 1315-1329, 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.7
, pp. 1315-1329
-
-
Cormio, C.1
Chowdhury, K.R.2
-
26
-
-
78751615533
-
Two types of attacks against cognitive radio network MAC protocols
-
L. Zhu and H. Zhou, "Two types of attacks against cognitive radio network MAC protocols, " in Proc. Int. Conf. Comput. Sci. Softw. Eng., 2008, vol. 4, pp. 1110-1113.
-
(2008)
Proc. Int. Conf. Comput. Sci. Softw. Eng.
, vol.4
, pp. 1110-1113
-
-
Zhu, L.1
Zhou, H.2
-
28
-
-
34547488337
-
Robust detection of selfish misbehavior in wireless networks
-
DOI 10.1109/JSAC.2007.070807
-
A. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks, " IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007. (Pubitemid 47171203)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Toledo, A.L.1
Wang, X.2
-
29
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
DOI 10.1109/TMC.2006.183, 1717438
-
M. Raya, I. Aad, J.-P. Hubaux, and A. El Fawal, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots, " IEEE Trans. Mobile Comput., vol. 5, no. 12, pp. 1691-1705, Dec. 2006. (Pubitemid 44711828)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.-P.3
El Fawal, A.4
-
30
-
-
79551627245
-
Cross-layer attack and defense in cognitive radio networks
-
DOI: 10.1109/GLOCOM.2010.5684069
-
W. Wang, Y. Sun, H. Li, and Z. Han, "Cross-layer attack and defense in cognitive radio networks, " in Proc. IEEE Global Telecommun. Conf., 2010, DOI: 10.1109/GLOCOM.2010.5684069.
-
(2010)
Proc. IEEE Global Telecommun. Conf.
-
-
Wang, W.1
Sun, Y.2
Li, H.3
Han, Z.4
-
32
-
-
84883081776
-
Location privacy in database-driven cognitive radio networks: Attacks and counter measures
-
Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and counter measures, " in Proc. IEEE INFOCOM, 2013, pp. 2751-2759.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2751-2759
-
-
Gao, Z.1
Zhu, H.2
Liu, Y.3
Li, M.4
Cao, Z.5
-
35
-
-
70450252080
-
Attacks on public WLAN-based positioning
-
N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun, "Attacks on public WLAN-based positioning, " in Proc. 7th Int. Conf. Mobile Syst. Appl. Services, 2009, pp. 29-40.
-
(2009)
Proc. 7th Int. Conf. Mobile Syst. Appl. Services
, pp. 29-40
-
-
Tippenhauer, N.O.1
Rasmussen, K.B.2
Popper, C.3
Capkun, S.4
-
36
-
-
34548759762
-
Community-based cognitive radio architecture: Policy-compliant innovation via the semantic web
-
DOI 10.1109/DYSPAN.2007.32, 4221494, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
A. Ginsberg, W. D. Horne, and J. D. Poston, "Community-based cognitive radio architecture: Policy-compliant innovation via the semantic web, " in Proc. 2nd IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2007, pp. 191-201. (Pubitemid 47431652)
-
(2007)
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 191-201
-
-
Ginsberg, A.1
Horne, W.D.2
Poston, J.D.3
-
37
-
-
58049207983
-
Policy-based spectrum access control for dynamic spectrum access network radios
-
F. Perich and M. McHenry, "Policy-based spectrum access control for dynamic spectrum access network radios, " Web Semantics, Sci. Services Agents World Wide Web, vol. 7, pp. 21-27, 2009.
-
(2009)
Web Semantics, Sci. Services Agents World Wide Web
, vol.7
, pp. 21-27
-
-
Perich, F.1
McHenry, M.2
-
38
-
-
77953201364
-
BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams
-
DOI: 10.1109/DYSPAN.2010.5457867
-
B. Bahrak, A. Deshpande, M. Whitaker, and J. Park, "BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams, " in Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2010, DOI: 10.1109/DYSPAN.2010.5457867.
-
(2010)
Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw.
-
-
Bahrak, B.1
Deshpande, A.2
Whitaker, M.3
Park, J.4
-
39
-
-
84863331029
-
Spectrum access policy reasoning for policy-based cognitive radios
-
Jul.
-
B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios, " Comput. Netw., vol. 56, no. 11, pp. 2649-2663, Jul. 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.11
, pp. 2649-2663
-
-
Bahrak, B.1
Deshpande, A.2
Park, J.3
-
40
-
-
34548760953
-
A policy engine for spectrum sharing
-
DOI 10.1109/DYSPAN.2007.15, 4221477, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
G. Denker, D. Elenius, R. Senanayake, M. O. Stehr, and D. Wilkins, "A policy engine for spectrum sharing, " in Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2007, pp. 55-65. (Pubitemid 47431635)
-
(2007)
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 55-65
-
-
Denker, G.1
Elenius, D.2
Senanayake, R.3
Stehr, M.-O.4
Wilkins, D.5
-
41
-
-
57849125918
-
Experimental field test results on feasibility of declarative spectrum management
-
DOI: 10.1109/DYSPAN.2008.28
-
F. Perich, R. Foster, P. Tenhula, and M. McHenry, "Experimental field test results on feasibility of declarative spectrum management, " in Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2008, DOI: 10.1109/DYSPAN.2008.28.
-
(2008)
Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw.
-
-
Perich, F.1
Foster, R.2
Tenhula, P.3
McHenry, M.4
-
42
-
-
33845443497
-
Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments
-
Sep.
-
A. Toninelli, J. Bradshaw, L. Kagal, and R. Montanari, "Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments, " in Proc. Semantic Web Policy Workshop, Sep. 2005, pp. 42-54.
-
(2005)
Proc. Semantic Web Policy Workshop
, pp. 42-54
-
-
Toninelli, A.1
Bradshaw, J.2
Kagal, L.3
Montanari, R.4
-
43
-
-
84876059701
-
Ontology-based spectrum access policies for policy-based cognitive radios
-
B. Bahrak, J. Park, and H. Wu, "Ontology-based spectrum access policies for policy-based cognitive radios, " in Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2012, pp. 489-500.
-
(2012)
Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw.
, pp. 489-500
-
-
Bahrak, B.1
Park, J.2
Wu, H.3
-
44
-
-
65249119255
-
Language issues for cognitive radio
-
Apr.
-
M. Kokar and L. Lechowicz, "Language issues for cognitive radio, " Proc. IEEE, vol. 97, no. 4, pp. 689-707, Apr. 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.4
, pp. 689-707
-
-
Kokar, M.1
Lechowicz, L.2
-
46
-
-
70350055213
-
An architecture for secure software defined radio
-
C. Li, A. Raghunathan, and N. Jha, "An architecture for secure software defined radio, " in Proc. Design Autom. Test Eur., 2009, pp. 448-453.
-
(2009)
Proc. Design Autom. Test Eur.
, pp. 448-453
-
-
Li, C.1
Raghunathan, A.2
Jha, N.3
-
47
-
-
70449632782
-
Tamper resistance for software defined radio software
-
S. Xiao, J. Park, and Y. Ye, "Tamper resistance for software defined radio software, " in Proc. 33rd Annu. IEEE Int. Comput. Softw. Appl. Conf., 2009, pp. 383-391.
-
(2009)
Proc. 33rd Annu. IEEE Int. Comput. Softw. Appl. Conf.
, pp. 383-391
-
-
Xiao, S.1
Park, J.2
Ye, Y.3
-
48
-
-
80755130139
-
Power fingerprinting in SDR integrity assessment for security and regulatory compliance
-
C. R. Aguayo Gonźalez J. H. Reed Dec.
-
C. R. Aguayo Gonźalez and J. H. Reed, "Power fingerprinting in SDR integrity assessment for security and regulatory compliance, " Analog Integr. Circuits Signal Process., vol. 69, no. 2-3, pp. 307-327, Dec. 2011.
-
(2011)
Analog Integr. Circuits Signal Process.
, vol.69
, Issue.2-3
, pp. 307-327
-
-
-
49
-
-
51849103005
-
Secure transmission power of cognitive radios for dynamic spectrum access applications
-
X. Li, J. Chen, and F. Ng, "Secure transmission power of cognitive radios for dynamic spectrum access applications, " in Proc. Conf. Inf. Sci. Syst., 2008, pp. 213-218.
-
(2008)
Proc. Conf. Inf. Sci. Syst.
, pp. 213-218
-
-
Li, X.1
Chen, J.2
Ng, F.3
-
51
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
Jan.-Mar.
-
E. Bertino and S. Ravi, "Database security-concepts, approaches, and challenges, " IEEE Trans. Depend. Secure Comput., vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005.
-
(2005)
IEEE Trans. Depend. Secure Comput.
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Ravi, S.2
-
52
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
DOI 10.1016/j.datak.2007.06.011, PII S0169023X07001322
-
L. Li, M. Kantarcioglu, and B. Thuraisingham, "The applicability of the perturbation based privacy preserving data mining for real-world data, " Data Knowl. Eng., vol. 65, no. 1, pp. 5-21, 2008. (Pubitemid 351295928)
-
(2008)
Data and Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
53
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-anonymity: A model for protecting privacy, " Int. J. Uncertainty Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
54
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
DOI: 10.1109/ICDE. 2006.1
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity, " in Proc. Int. Conf. Data Eng., 2006, DOI: 10.1109/ICDE. 2006.1.
-
(2006)
Proc. Int. Conf. Data Eng.
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
55
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and -diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and l-diversity, " in Proc. Int. Conf. Data Eng., 2007, pp. 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
56
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, " in Proc. IEEE Symp. Res. Security Privacy, 1998.
-
(1998)
Proc. IEEE Symp. Res. Security Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
57
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential privacy, " in Proc. Int. Conf. Automata Lang. Programm., 2006, pp. 1-12. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 1-12
-
-
Dwork, C.1
-
58
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, 2003, pp. 31-42.
-
(2003)
Proc. 1st Int. Conf. Mobile Syst. Appl. Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
59
-
-
69949127837
-
-
Berlin, Germany: Springer-Verlag
-
J. Freudiger, R. Shokri, and J. Hubaux, "On the optimal placement of mix zones Privacy Enhancing Technologies, vol. 5672, Berlin, Germany: Springer-Verlag, 2009, pp. 216-234.
-
(2009)
On the Optimal Placement of Mix Zones Privacy Enhancing Technologies
, vol.5672
, pp. 216-234
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.3
-
60
-
-
74049115383
-
Faking contextual data for fun, profit, and privacy
-
R. Chow and P. Golle, "Faking contextual data for fun, profit, and privacy, " in Proc. 8th ACM Workshop Privacy Electron. Soc., 2009, pp. 105-108.
-
(2009)
Proc. 8th ACM Workshop Privacy Electron. Soc.
, pp. 105-108
-
-
Chow, R.1
Golle, P.2
-
61
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
62
-
-
38049181728
-
Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting
-
Oct.
-
J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting, " in Proc. Int. Conf. Commun. Comput. Netw., Oct. 2006.
-
(2006)
Proc. Int. Conf. Commun. Comput. Netw
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
63
-
-
34249822230
-
Wireless security through RF fingerprinting
-
DOI 10.1109/CJECE.2007.364330
-
O. Ureten and N. Serinken, "Wireless security through RF fingerprinting, " Can. J. Electr. Comput. Eng., vol. 32, no. 1, pp. 27-33, 2007. (Pubitemid 46852763)
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
64
-
-
67249119918
-
Specific emitter identification for cognitive radio with application to IEEE 802.11
-
DOI: 10.1109/GLOCOM.2008.ECP.404
-
K. Kim, C. Spooner, I. Akbar, and J. Reed, "Specific emitter identification for cognitive radio with application to IEEE 802.11, " in Proc. IEEE Global Telecommun. Conf., 2008, DOI: 10.1109/GLOCOM.2008.ECP.404.
-
(2008)
Proc. IEEE Global Telecommun. Conf.
-
-
Kim, K.1
Spooner, C.2
Akbar, I.3
Reed, J.4
-
65
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures, " in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008, pp. 116-127.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Comput. Netw.
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
67
-
-
33846997176
-
Electromagnetic signatures of WLAN cards and network security
-
Dec.
-
K. A. Remley, C. A. Grosvenor, R. T. Johnk, D. R. Novotny, P. D. Hale, M. D. Mckinley, A. Karygiannis, and E. Antonakakis, "Electromagnetic signatures of WLAN cards and network security, " in Proc. IEEE Int. Symp. Signal Process. Inf. Technol., Dec. 2005, pp. 484-488.?
-
(2005)
Proc. IEEE Int. Symp. Signal Process. Inf. Technol
, pp. 484-488
-
-
Remley, K.A.1
Grosvenor, C.A.2
Johnk, R.T.3
Novotny, D.R.4
Hale, P.D.5
McKinley, M.D.6
Karygiannis, A.7
Antonakakis, E.8
-
68
-
-
77952407534
-
Attacks on physical layer identification
-
B. Danev, H. Luecken, S. Capkun, and K. Defrawy, "Attacks on physical layer identification, " in Proc. 3rd ACM Conf. Wireless Netw. Security, 2010, pp. 89-98.
-
(2010)
Proc. 3rd ACM Conf. Wireless Netw. Security
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
Defrawy, K.4
-
69
-
-
0032625842
-
Watermarking as communication with side information
-
Jul.
-
I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information, " Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
70
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
Mar.
-
C. Fei, D. Kundur, and R. Kwong, "Analysis and design of secure watermark-based authentication systems, " IEEE Trans. Inf. Forens. Security, vol. 1, no. 1, pp. 43-55, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forens. Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.3
-
71
-
-
77953185209
-
Physical layer authentication watermarks through synthetic channel emulation
-
Apr. DOI: 10.1109/DYSPAN.2010. 5457897
-
N. Goergen, T. Clancy, and T. Newman, "Physical layer authentication watermarks through synthetic channel emulation, " in Proc. IEEE Symp. New Frontiers Dyn. Spectrum, Apr. 2010, DOI: 10.1109/DYSPAN.2010. 5457897.
-
(2010)
Proc. IEEE Symp. New Frontiers Dyn. Spectrum
-
-
Goergen, N.1
Clancy, T.2
Newman, T.3
-
72
-
-
4544248818
-
Radio frequency watermarking for OFDM wireless networks
-
May
-
J. Kleider, S. Gifford, S. Chuprun, and B. Fette, "Radio frequency watermarking for OFDM wireless networks, " in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., May 2004, vol. 5, pp. 397-400.
-
(2004)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process
, vol.5
, pp. 397-400
-
-
Kleider, J.1
Gifford, S.2
Chuprun, S.3
Fette, B.4
-
73
-
-
5444259436
-
Transmitter identification using embedded pseudo random sequences
-
Sep.
-
X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences, " IEEE Trans. Broadcast., vol. 50, no. 3, pp. 244-252, Sep. 2004.
-
(2004)
IEEE Trans. Broadcast.
, vol.50
, Issue.3
, pp. 244-252
-
-
Wang, X.1
Wu, Y.2
Caron, B.3
-
74
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
Jul.
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels, " IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
75
-
-
39449137863
-
Physical-layer authentication
-
DOI 10.1109/TIFS.2007.916273
-
P. Yu, J. Baras, and B. Sadler, "Physical-layer authentication, " IEEE Trans. Inf. Forens. Security, vol. 3, no. 1, pp. 38-51, Mar. 2008. (Pubitemid 351270071)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.L.1
Baras, J.S.2
Sadler, B.M.3
-
77
-
-
80051914579
-
Cryptographic link signatures for spectrum usage authentication in cognitive radio
-
Jun.
-
X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio, " in Proc. 4th ACM Conf. Wireless Netw. Security, Jun. 2011, pp. 79-90.
-
(2011)
Proc. 4th ACM Conf. Wireless Netw. Security
, pp. 79-90
-
-
Tan, X.1
Borle, K.2
Du, W.3
Chen, B.4
-
78
-
-
80051889486
-
ACE: Authenticating the channel estimation process in wireless communication systems
-
R. Miller and W. Trappe, "ACE: Authenticating the channel estimation process in wireless communication systems, " in Proc. 4th ACM Conf. Wireless Netw. Security, 2011, pp. 91-96.
-
(2011)
Proc. 4th ACM Conf. Wireless Netw. Security
, pp. 91-96
-
-
Miller, R.1
Trappe, W.2
-
79
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
May
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures, " in Proc. IEEE Symp. Security Privacy, May 2010, pp. 286-301.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
80
-
-
84863553166
-
Enforcing dynamic spectrum access with spectrum permits
-
L. Yang, Z. Zhang, B. Y. Zhao, C. Kruegel, and H. Zheng, "Enforcing dynamic spectrum access with spectrum permits, " in Proc. 13th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2012, pp. 195-204.
-
(2012)
Proc. 13th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 195-204
-
-
Yang, L.1
Zhang, Z.2
Zhao, B.Y.3
Kruegel, C.4
Zheng, H.5
-
81
-
-
84893562953
-
PHY-layer authentication by introducing controlled inter symbol interference
-
Oct.
-
V. Kumar, J.-M. Park, T. C. Clancy, and K. Bian, "PHY-layer authentication by introducing controlled inter symbol interference, " in Proc. IEEE Conf. Commun. Netw. Security, Oct. 2013, pp. 27-35.
-
(2013)
Proc. IEEE Conf. Commun. Netw. Security
, pp. 27-35
-
-
Kumar, V.1
Park, J.-M.2
Clancy, T.C.3
Bian, K.4
-
82
-
-
64849108029
-
Non-interactive localization of cognitive radios based on dynamic signal strength mapping
-
S. Liu, Y. Chen, W. Trappe, and L. J. Greenstein, "Non-interactive localization of cognitive radios based on dynamic signal strength mapping, " in Proc. 6th Int. Conf. Wireless On-Demand Netw. Syst. Services, 2009, pp. 77-84.
-
(2009)
Proc. 6th Int. Conf. Wireless On-Demand Netw. Syst. Services
, pp. 77-84
-
-
Liu, S.1
Chen, Y.2
Trappe, W.3
Greenstein, L.J.4
-
83
-
-
1542329081
-
Range-free localization schemes for large scale sensor networks
-
T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher, "Range-free localization schemes for large scale sensor networks, " in Proc. 9th Annu. Int. Conf. Mobile Comput. Netw., 2003, pp. 81-95.
-
(2003)
Proc. 9th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 81-95
-
-
He, T.1
Huang, C.2
Blum, B.M.3
Stankovic, J.A.4
Abdelzaher, T.5
-
84
-
-
64549089248
-
Crime and punishment for cognitive radios
-
K. Woyach, A. Sahai, G. Atia, and V. Saligrama, "Crime and punishment for cognitive radios, " in Proc. 46th Annu. Allerton Conf. Commun. Control Comput., 2008, pp. 236-243.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun. Control Comput.
, pp. 236-243
-
-
Woyach, K.1
Sahai, A.2
Atia, G.3
Saligrama, V.4
-
85
-
-
84891105327
-
Enforcement in dynamic spectrum access systems
-
Sep.
-
M. B. Weiss, W. H. Lehr, L. Cui, and M. Altamaimi, "Enforcement in dynamic spectrum access systems, " in Proc. Telecommun. Policy Res. Conf., Sep. 2012.
-
(2012)
Proc. Telecommun. Policy Res. Conf
-
-
Weiss, M.B.1
Lehr, W.H.2
Cui, L.3
Altamaimi, M.4
-
86
-
-
84880858805
-
Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
-
Berlin, Germany: Springer-Verlag
-
K. Ren, X. Liu, W. Liang, M. Xu, X. Jia, and K. Xing, "Enforcing spectrum access rules in cognitive radio networks through cooperative jamming, " in Wireless Algorithms, Systems, and Applications, vol. 7992. Berlin, Germany: Springer-Verlag, 2013, pp. 440-453.
-
(2013)
Wireless Algorithms, Systems, and Applications
, vol.7992
, pp. 440-453
-
-
Ren, K.1
Liu, X.2
Liang, W.3
Xu, M.4
Jia, X.5
Xing, K.6
|