has been cited by the following article(s):
[1]
|
Possible adoption of various machine learning techniques in cognitive radio-a survey
|
|
2021 |
|
|
[2]
|
Slow Scan Attack Detection Based on Communication Behavior
|
|
2020 |
|
|
[3]
|
Secure Distributed Spectrum Sensing in Cognitive Radio Networks
|
|
2019 |
|
|
[4]
|
Hybrid accuracy-time trade-off solution for spectrum sensing in cognitive radio networks
|
|
2019 |
|
|
[5]
|
Special issue on security for emerging open networking technologies
|
|
2018 |
|
|
[6]
|
Survey on Fuzzy Logic Enabled Cognitive Radios
|
|
Emerging Technologies in Computing,
2018 |
|
|
[7]
|
Malicious user detection in infra-structre based Cognitive radio networs (CRNs)
|
|
2018 |
|
|
[8]
|
Improved Energy Detector for Spectrum Sensing Using Neuro-Fuzzy Double Threshold Technique
|
|
Studies in Informatics and …,
2017 |
|
|
[9]
|
An antenna selection scheme with MRE and AWC for decision fusion in cognitive radio
|
|
Transactions on Emerging Telecommunications Technologies,
2017 |
|
|
[10]
|
A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks
|
|
Wireless Personal Communications,
2017 |
|
|
[11]
|
Trust management in cognitive radio networks: A survey
|
|
International Journal of Network Management,
2017 |
|
|
[12]
|
CERTAIN INVESTIGATIONS ON SPECTRUM SENSING FRAMEWORK AND ATTACK DETECTION IN COGNITIVE RADIO NETWORKS
|
|
2016 |
|
|
[13]
|
Security challenges in cognitive radio network and defending against Byzantine attack: a survey
|
|
International Journal of Communication Networks and Distributed Systems,
2016 |
|
|
[14]
|
Function approximation based energy detection in cognitive radio using radial basis function network
|
|
Journal of Clinical and Experimental Neuropsychology,
2016 |
|
|
[15]
|
Fusion Rule for Cooperative Spectrum Sensing in Cognitive Radio
|
|
Circuits, Systems, and Signal Processing,
2015 |
|
|
[16]
|
Fortification of malicious onslaughts using enhanced fusion centre
|
|
Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on,
2014 |
|
|
[17]
|
Fuzzy based Implementation Resource Allocation in Cognitive Radio Networks for Secondary Users
|
|
Wireless Communication,
2013 |
|
|
[18]
|
Cellular Automata Approach for a Low Power Fusion Center to Evaluate Spectrum Status and Coverage Area in Cognitive Radios
|
|
Journal of Low Power …,
2013 |
|
|
[1]
|
Slow Scan Attack Detection Based on Communication Behavior
2020 the 10th International Conference on Communication and Network Security,
2020
DOI:10.1145/3442520.3442525
|
|
|
[2]
|
Slow Scan Attack Detection Based on Communication Behavior
2020 the 10th International Conference on Communication and Network Security,
2020
DOI:10.1145/3442520.3442525
|
|
|
[3]
|
A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks
Wireless Personal Communications,
2017
DOI:10.1007/s11277-017-4621-5
|
|
|
[4]
|
Fortification of malicious onslaughts using enhanced fusion centre
2014 IEEE International Conference on Computational Intelligence and Computing Research,
2014
DOI:10.1109/ICCIC.2014.7238565
|
|
|