Author:
Bhunia Suman,Sengupta Shamik,Vázquez-Abad Felisa
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference39 articles.
1. A survey on security threats and detection techniques in cognitive radio networks;Fragkiadakis;IEEE Commun. Surv. Tutorials,2013
2. S. Bhattacharjee, S. Sengupta, M. Chatterjee, Vulnerabilities in cognitive radio networks: A survey, Comput. Commun. 36 (13).
3. Jamming and sensing of encrypted wireless ad hoc networks;Brown,2006
4. Channel surfing and spatial retreats: defenses against wireless denial of service;Xu,2004
5. Using channel hopping to increase 802.11 resilience to jamming attacks;Navda,2007
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献