[1]
|
J. Mitola III, “Cognitive Radio for Flexible Mobile Multimedia Communications,” Journal Mobile Networks and Applications, 2001, Vol. 6, No. 5, pp. 435-441.
doi:10.1023/A:1011426600077
|
[2]
|
Q. Zhang, A. B. J. Kokkeler and G. J. M. Smit, “A Re- configurable Radio Architecture for Cognitive Radio in Emergency Networks,” The 9th European Conference on Wireless Technology, Manchester,10-12 September 2006, pp. 35-38. doi:10.1109/ECWT.2006.280428
|
[3]
|
H. Y. Tang, “Some Physical Layer Issues of Wide-Band Cognitive Radio Systems,” First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Baltimore, 8-11 November 2005, pp. 151-159.
doi:10.1109/DYSPAN.2005.1542630
|
[4]
|
R. Chen, J. M. Park and J. H. Reed, “Defense against Primary User Emulation Attacks in Cognitive Radio Networks,” IEEE Journal on Selected Areas in Communications, Vol. 26, No. 1, 2008, pp. 25-37.
doi:10.1109/JSAC.2008.080104
|
[5]
|
Y. Zhang, G. C. Xu and X. Z. Geng, “Security Threats in Cognitive Radio Networks,” 10th IEEE International Conference on High Performance Computing and Communications, Dalian, 25-27 September 2008, pp. 1036-1041.
doi:10.1109/HPCC.2008.21
|
[6]
|
X. W. Zhou and X. Y. Xin, “Key Technology Research on Cognitive Radio Security,” Telecommunications Science, Vol. 24, No. 2, 2008.
|
[7]
|
Q. H. Mahmoud, “Cognitive Networks,” John Wiley & Sons Ltd., Chichester, 2007.
|
[8]
|
Q. Liu, Z. Zhou, C. Yang and Y. B. Ye, “The Coverage Analysis of Cognitive Radio Network,” 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 12-14 October 2008, pp. 1-4. doi:10.1109/WiCom.2008.306
|
[9]
|
K. G. Bian and J. Min, “Security Vulnerabilities in IEEE 802.22,” Proceedings of the 4th Annual International Conference on Wireless Internet, Maui, 17-19 November 2008, pp. 1-9.
|
[10]
|
R. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing Techniques for Cognitive Radio Systems,” IEEE International Conference on Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
doi:10.1109/ICC.2008.640
|
[11]
|
X. Y. Zhang and C. Li, “Constructing Secured Cognitive Wireless Networks: Experiences and Challenges,” Wireless Communications and Mobile Computing, Vol. 10, No. 1, 2010, pp. 50-69.
|
[12]
|
M. K. Baek and J. Y. Kim, “Effective Signal Detection Using Cooperative Spectrum Sensing in Cognitive Radio Systems,” 11th International Conference on Advanced Communication Technology, Phoenix Park, 15-18 February 2009, pp. 1746-1750.
|
[13]
|
R. S. Gong, Z. Y. Hu and T. Shen, “Adaptive CRN Spectrum Sensing Scheme with Excellence in Topology and Scan Scheduling,” 3rd International Conference on Sensing Technology, Tainan, 30 November-3 December 2008, pp. 384-391. doi:10.1109/ICSENST.2008.4757133
|
[14]
|
S. Arkoulis, L. Kazatzopoulos, C. Delakouridis and G. F. Marias, “Cognitive Spectrum and Its Security Issues,” The Second International Conference on Next Generation Mobile Applications, Services and Technologies, 16-19 September 2008, pp. 565-570.
doi:10.1109/NGMAST.2008.102
|
[15]
|
A. O. Richard, K. Kim and A. Ahmad, “On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature,” Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, 3-6 August 2009, pp. 1-5.
doi:10.1109/ICCCN.2009.5235288
|
[16]
|
W. K. Wang and H. S. Lit, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks,” 43rd Annual Conference on Information Sciences and Systems, Baltimore, 18-20 March 2009, pp. 130-134.
doi:10.1109/CISS.2009.5054704
|
[17]
|
K. Takeuchi, S. Kaneko and S. Nomoto, “Radio Environment Prediction for Cognitive Radio,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, 15-17 May 2008, pp. 1-6. doi:10.1109/CROWNCOM.2008.4562502
|
[18]
|
D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, Asilomar, 7-10 November 2004, pp. 772-776.
doi:10.1109/ACSSC.2004.1399240
|
[19]
|
T. C. Clancy and N. Goergen, “Security in Cognitive Radio Networks: Threats and Mitigation,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, 15-17 May 2008, pp. 1- 8. doi:10.1109/CROWNCOM.2008.4562534
|