[LLIBRE][B] Digital Signal Processing with Matlab Examples, Volume 3

JM Giron-Sierra - 2017 - Springer
Probably the most important technological invention of the previous century was the
transistor. And another very important invention was the digital computer, which got a …

[LLIBRE][B] Cognitive radio communication and networking: Principles and practice

RC Qiu, Z Hu, H Li, MC Wicks - 2012 - books.google.com
The author presents a unified treatment of this highly interdisciplinary topic to help define the
notion of cognitive radio. The book begins with addressing issues such as the fundamental …

A layered approach to cognitive radio network security: A survey

D Hlavacek, JM Chang - Computer Networks, 2014 - Elsevier
Cognitive radios have been identified as a solution to the crowded spectrum issue. With the
realization of cognitive radio networks came the recognition that both new and old security …

A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network

M Ghaznavi, A Jamshidi - IEEE Sensors Journal, 2014 - ieeexplore.ieee.org
Spectrum sensing is an important issue in cognitive radio networks. But due to noise and
shadowing effects, the sensing results of sensors may be erroneous. This will degrade the …

Overlay CR-NOMA assisted intelligent transportation system networks with imperfect SIC and CEEs

L **ngwang, G Xuesong, L Yingting… - Chinese Journal of …, 2023 - ieeexplore.ieee.org
With the development of the mobile communication and intelligent information technologies,
the intelligent transportation systems driven by the sixth generation (6G) has many …

A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks

M Ghaznavi, A Jamshidi - Computer Communications, 2019 - Elsevier
In cognitive radio networks, the security attacks disrupt the spectrum sensing process. One
of the most threatening attacks is spectrum sensing data falsification (SSDF) attack, where …

A survey on security in Cognitive Radio networks

M Khasawneh, A Agarwal - 2014 6th International Conference …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) has been introduced to accommodate the steady increment in the
spectrum demand. In CR networks, unlicensed users, which are referred to as secondary …

A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks

M Khasawneh, A Agarwal - Security and Communication …, 2017 - Wiley Online Library
Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive
Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are …

L1-subspace tracking for streaming data

Y Liu, K Tountas, DA Pados, SN Batalama… - Pattern Recognition, 2020 - Elsevier
High-dimensional data usually exhibit intrinsic low-rank structures. With tremendous amount
of streaming data generated by ubiquitous sensors in the world of Internet-of-Things, fast …

A secure MAC protocol for cognitive radio networks (SMCRN)

W Alhakami, A Mansour, GA Safdar… - 2013 Science and …, 2013 - ieeexplore.ieee.org
In addition to standard authentication and data confidentiality requirements, Cognitive Radio
Networks (CRNs) face distinct security issues such as primary user emulation and spectrum …