共 28 条
[1]
Albehadili A., 2018, IEEE ACCESS
[2]
BISHOP C. M., 2006, Pattern recognition and machine learning, DOI [DOI 10.1117/1.2819119, 10.1007/978-0-387-45528-0]
[3]
Bloessl B., 1996, IEEE T MOBILE COMPTI, V17, P1162
[4]
Caidan Zhao, 2010, Proceedings of the 2010 International Conference on Communications and Mobile Computing (CMC 2010), P154, DOI 10.1109/CMC.2010.36
[5]
CHEN R, 2008, IEEE J SELECTED AREA, V26
[6]
Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
[J].
2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009),
2009,
:208-215
[7]
Chenji H., 2016, 34th AIAA International Communications Satellite Systems Conference, P5728
[8]
Chin W.-L., 2012, Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th, P1
[9]
Farhat MT, 2018, PROC NAECON IEEE NAT, P137, DOI 10.1109/NAECON.2018.8556763
[10]
Fragkiadakis A. G., 2015, IEEE COMMUNICATIONS, V15, P428