[LLIBRE][B] Digital Signal Processing with Matlab Examples, Volume 3
JM Giron-Sierra - 2017 - Springer
Probably the most important technological invention of the previous century was the
transistor. And another very important invention was the digital computer, which got a …
transistor. And another very important invention was the digital computer, which got a …
[LLIBRE][B] Cognitive radio communication and networking: Principles and practice
The author presents a unified treatment of this highly interdisciplinary topic to help define the
notion of cognitive radio. The book begins with addressing issues such as the fundamental …
notion of cognitive radio. The book begins with addressing issues such as the fundamental …
A layered approach to cognitive radio network security: A survey
D Hlavacek, JM Chang - Computer Networks, 2014 - Elsevier
Cognitive radios have been identified as a solution to the crowded spectrum issue. With the
realization of cognitive radio networks came the recognition that both new and old security …
realization of cognitive radio networks came the recognition that both new and old security …
A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network
Spectrum sensing is an important issue in cognitive radio networks. But due to noise and
shadowing effects, the sensing results of sensors may be erroneous. This will degrade the …
shadowing effects, the sensing results of sensors may be erroneous. This will degrade the …
Overlay CR-NOMA assisted intelligent transportation system networks with imperfect SIC and CEEs
L **ngwang, G Xuesong, L Yingting… - Chinese Journal of …, 2023 - ieeexplore.ieee.org
With the development of the mobile communication and intelligent information technologies,
the intelligent transportation systems driven by the sixth generation (6G) has many …
the intelligent transportation systems driven by the sixth generation (6G) has many …
A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks
In cognitive radio networks, the security attacks disrupt the spectrum sensing process. One
of the most threatening attacks is spectrum sensing data falsification (SSDF) attack, where …
of the most threatening attacks is spectrum sensing data falsification (SSDF) attack, where …
A survey on security in Cognitive Radio networks
M Khasawneh, A Agarwal - 2014 6th International Conference …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) has been introduced to accommodate the steady increment in the
spectrum demand. In CR networks, unlicensed users, which are referred to as secondary …
spectrum demand. In CR networks, unlicensed users, which are referred to as secondary …
A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks
M Khasawneh, A Agarwal - Security and Communication …, 2017 - Wiley Online Library
Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive
Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are …
Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are …
L1-subspace tracking for streaming data
High-dimensional data usually exhibit intrinsic low-rank structures. With tremendous amount
of streaming data generated by ubiquitous sensors in the world of Internet-of-Things, fast …
of streaming data generated by ubiquitous sensors in the world of Internet-of-Things, fast …
A secure MAC protocol for cognitive radio networks (SMCRN)
In addition to standard authentication and data confidentiality requirements, Cognitive Radio
Networks (CRNs) face distinct security issues such as primary user emulation and spectrum …
Networks (CRNs) face distinct security issues such as primary user emulation and spectrum …