Author:
Dong Qi,Yang Zekun,Chen Yu,Li Xiaohua,Zeng Kai
Publisher
Springer International Publishing
Reference21 articles.
1. Adelantado, F., Verikoukis, C.: Detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach. Ad Hoc Netw. 11(8), 2367–2380 (2013)
2. Esch, J.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE 12(100), 3170–3171 (2012)
3. Basseville, M., Nikiforov, I.V., et al.: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993)
4. Poor, H.V.: Hadjiliadis O Quickest detection, vol. 40. Cambridge University Press, Cambridge (2009)
5. Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: IEEE (2010)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献