Author:
Brown Timothy X,Sethi Amita
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference30 articles.
1. Akyildiz IF, Lee WY, Vuran MC, Mohanty S (2006) NeXt generation dynamic spectrum access cognitive radio wireless networks: a survey. Comput Networks 50:2127–2159
2. Barbeau M (2005) WiMax/802.16 threat analysis. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, Quebec, Canada
3. Brown TX (2005) An analysis of licensed channel avoidance strategies for unlicensed devices. In: Proceedings of IEEE DySPAN, Nov. 8–11
4. Brown TX, James JE, Sethi A (2006) Jamming and sensing of encrypted wireless ad hoc networks. In: Proceedings of the seventh ACM international symposium on mobile ad hoc networking and computing (MobiHoc), Florence, 22–25 May
5. Brown TX, Sethi A (2007) Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies 2007 (ISART 2007), Boulder, 26–28 Feb
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献