Author:
Choudhary Suditi,Hussain Muzzammil
Reference11 articles.
1. Čabrić, D., Mishra, S. M., Willkomm, D., Brodersen, R., & Wolisz, A. (2005, June). A cognitive radio approach for usage of virtual unlicensed spectrum. In Proc. of 14th IST mobile wireless communications summit, 1--4.
2. Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691--1708.
3. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2008). A survey on spectrum management in cognitive radio networks. Communications Magazine, IEEE, 46(4), 40--48.
4. Kim, H. S. (2011). Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications, 34(4), 1160--1167.
5. Bhattacharjee, S., Sengupta, S., & Chatterjee, M. (2013). Vulnerabilities in cognitive radio networks: A survey. Computer Communications, 36(13), 1387--1398.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献