X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cognitive radio (41) 41
telecommunications (27) 27
detection (26) 26
computer science, information systems (24) 24
cognitive radio networks (19) 19
networks (18) 18
algorithms (17) 17
engineering, electrical & electronic (16) 16
security (16) 16
sensors (14) 14
computer simulation (13) 13
cooperative spectrum sensing (13) 13
wireless networks (12) 12
engineering (11) 11
spectrum sensing (11) 11
wireless-netzwerk (10) 10
radio networks (9) 9
communications engineering, networks (8) 8
computer communication networks (8) 8
electrical engineering (8) 8
network security (8) 8
spectrum allocation (8) 8
optimization (7) 7
simuliertes ergebnis (7) 7
analysis (6) 6
collaboration (6) 6
research (6) 6
band spectra (5) 5
channels (5) 5
computer security (5) 5
data security (5) 5
defense (5) 5
detectors (5) 5
false alarms (5) 5
fusion (5) 5
signal processing (5) 5
simulation (5) 5
spectrum sensing data falsification (5) 5
spektralband (5) 5
trust (5) 5
wireless communication (5) 5
wireless communications (5) 5
ad hoc networks (4) 4
article subject (4) 4
communication networks (4) 4
consensus (4) 4
cooperation (4) 4
dynamic spectrum access (4) 4
dynamics (4) 4
emulation (4) 4
energy (4) 4
energy efficiency (4) 4
engineering research (4) 4
licenses (4) 4
mathematical models (4) 4
methods (4) 4
primary user emulation attack (4) 4
signal to noise ratio (4) 4
spectrum sensing data falsification attack (4) 4
studies (4) 4
usage (4) 4
wireless sensor networks (4) 4
abtastmethode (3) 3
bands (3) 3
chemistry, analytical (3) 3
collaborative spectrum sensing (3) 3
denial of service attacks (3) 3
drahtloses sensornetzwerk (3) 3
frequencies (3) 3
index medicus (3) 3
instruments & instrumentation (3) 3
it in business (3) 3
mathematics (3) 3
multidisciplinary sciences (3) 3
primary user emulation (3) 3
privacy (3) 3
probability theory (3) 3
radio spectra (3) 3
reliability (3) 3
reputations (3) 3
sensortechnik (3) 3
sicherheitsbedrohung (3) 3
trustworthiness (3) 3
access (2) 2
attacks (2) 2
biology and life sciences (2) 2
business information systems (2) 2
byzantine attack (2) 2
cascading style sheets (2) 2
chemical technology (2) 2
clustering (2) 2
cognitive ability (2) 2
cognitive radio network (2) 2
communication (2) 2
complexity (2) 2
computer information security (2) 2
connectivity (2) 2
control (2) 2
countermeasures (2) 2
data falsification attack (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International journal of distributed sensor networks, ISSN 1550-1477, 2019, Volume 15, Issue 9, p. 155014771987064
.... However, spectrum-sensing data falsification attack being launched by malicious users may lead to fatal mistake of global decision about spectrum availability at the fusion center... 
Spectrum sensing | reputation degree | data falsification attack | COMPUTER SCIENCE, INFORMATION SYSTEMS | cognitive radio sensor networks | TELECOMMUNICATIONS | TRUST
Journal Article
International journal of communication systems, ISSN 1074-5351, 2019, Volume 32, Issue 2, pp. e3852 - n/a
Journal Article
中国科学:信息科学(英文版), ISSN 1674-733X, 2014, Volume 57, Issue 4, pp. 1 - 9
Journal Article
Journal of information security and applications, ISSN 2214-2126, 2018, Volume 42, pp. 29 - 35
.... Spectrum sensing data falsification attack (SSDF) is one of the attacks that some research works have been presented to defend against it, based on trust and reputation management (TRM... 
Data falsification attack | Cognitive radio | Multi-hop cooperative spectrum sensing | Trust and reputation management | MANET | AD HOC | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Symmetry, ISSN 2073-8994, 2016, Volume 8, Issue 12, pp. 147 - 147
Journal Article
Wireless Personal Communications, ISSN 0929-6212, 11/2017, Volume 97, Issue 2, pp. 3215 - 3238
Journal Article
2014 IEEE Military Communications Conference, ISSN 2155-7578, 10/2014, pp. 235 - 241
The paper addresses the problem of spectrum sensing data falsification (SSDF) attacks in cooperative sensing and develops a dynamic trust management scheme... 
Performance evaluation | trust | spectrum sensing data falsification attack | Throughput | Cognitive radio | security | repu-tation | Detectors | spectrum sensing | software-defined radio | Bayes methods | cooperative sensing | Reliability | cognitive radio network
Conference Proceeding
IEEE transactions on communications, ISSN 0090-6778, 6/2020, pp. 1 - 1
.... Meanwhile, the presence of malicious attacks such as Primary User Emulation and Spectrum Sensing Data Falsification (SSDF... 
ensemble machine learning | primary user emulation | Cognitive radio | full-duplex | spectrum sensing data falsification
Journal Article
MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), 10/2018, Volume 2019-, pp. 407 - 412
Conference Proceeding
2016 Online International Conference on Green Engineering and Technologies (IC-GET), 11/2016, pp. 1 - 5
.... Primary user emulation attack (PUEA) and spectrum sensing data falsification attack (SSDF) are the two common threats to CRNs... 
Cooperative spectrum sensing | Emulation | Interference | Primary user emulation attack | Sensors | Delays | Cognitive radio | Reliability | Malicious users | Cascading style sheets | Spectrum sensing data falsification attack
Conference Proceeding
EURASIP Journal on Information Security, ISSN 1687-4161, 12/2015, Volume 2015, Issue 1, pp. 1 - 14
Journal Article
International Journal of Communication Networks and Distributed Systems, ISSN 1754-3916, 2016, Volume 17, Issue 2, pp. 120 - 146
... in cognitive radio network and defending against Byzantine attack: a survey Sumit Kar* and Srinivas Sethi Department of Computer Science Engineering and Application... 
DSA | SSDF | Dynamic spectrum access | CRN specific threats | Attack | Security | Cognitive radio networks | Byzantine attack | Spectrum sensing data falsification | Wireless communication | Networks | Communities | Open systems | Threat evaluation | Communication networks | Cognitive radio
Journal Article
Transactions on emerging telecommunications technologies, ISSN 2161-3915, 2012, Volume 23, Issue 5, pp. 454 - 465
ABSTRACT We focus on a specific class of denial‐of‐service (DoS) attacks that is executed through Channel Eviction Triggering (CET... 
spectrum sensing data falsification attack | cooperative spectrum sensing | cognitive radio networks | Cooperative spectrum sensing | Cognitive radio networks | Spectrum sensing data falsification attack | IEEE 802.22 | TELECOMMUNICATIONS
Journal Article
电子学报:英文版, ISSN 1022-4653, 2017, Volume 26, Issue 2, pp. 399 - 406
... data.To defense against Spectrum sensing data falsification(SSDF) attack,we propose a neighbor detection-based spectrum sensing algorithm in distributed CRNs... 
算法 | 攻击者 | 无线电频谱 | 检测 | 感知 | 邻居 | 分布式 | 无线电网络 | Connectivity | Spectrum sensing data falsification (SSDF) | Cognitive radio networks (CRNs) | Neighbor detection | CONSENSUS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
KSII Transactions on Internet and Information Systems, ISSN 1976-7277, 12/2010, Volume 4, Issue 6, pp. 1042 - 1062
.... On the basis of recent advances in bio-inspired consensus algorithms, an attack-proof, decentralized CSS scheme is proposed in which all secondary users can maintain cooperative sensing by exchanging... 
Cooperative spectrum sensing | Metropolis weights | Cognitive radio networks | Consensus | Spectrum sensing data falsification | consensus | metropolis weights | SOFT COMBINATION | cooperative spectrum sensing | spectrum sensing data falsification | COMPUTER SCIENCE, INFORMATION SYSTEMS | OPTIMIZATION | TELECOMMUNICATIONS | Algorithms | Research | 컴퓨터학
Journal Article
Security and Communication Networks, ISSN 1939-0114, 12/2015, Volume 8, Issue 18, pp. 3978 - 3994
...). However, cooperative paradigms are threatened by the behavior of malicious users. Two types of attacks represent the main threats for CSS network operation, namely, spectrum sensing data falsification (SSDF... 
security | cognitive radio | cooperative spectrum sensing | energy efficiency | Energy efficiency | Cooperative spectrum sensing | Cognitive radio | Security | DEFENSE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | USER EMULATION ATTACKS | Intrusion | Computer simulation | Lightweight | Weight reduction | False alarms | Frequencies | Radio networks | Cryptography | Detection | Computer security | Networks | Energy management
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.