Detection of the Primary User's Behavior for the Intervention of the Secondary User Using Machine Learning

被引:3
|
作者
Zambrano Soto, Deisy Dayana [1 ]
Salcedo Parra, Octavio Jose [1 ,2 ]
Lopez Sarmiento, Danilo Alfonso [1 ]
机构
[1] Univ Distrital Francisco Jose de Caldas, Internet Res Grp, Fac Engn, Bogota, Colombia
[2] Univ Nacl Colombia, Fac Engn, Dept Syst & Ind Engn, Bogota, Colombia
来源
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018 | 2018年 / 11251卷
关键词
Cognitive Radio; KNN; LR; Machine learning; Primary users (PU); SVM;
D O I
10.1007/978-3-030-03192-3_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The predictive analysis for the spectral decision with automatic Learning is a task that is currently challenging. Some automatic Learning techniques are shown in order to predict the presence or absence of a primary user (PU) in Cognitive Radio. Four machine learning methods are examined including the K-nearest neighbors (KNN), the support vector machines (SVM), logistic regression (LR) and decision tree (DT) classifiers. These predictive models are built based on data and their performance is compared with the purpose of selecting the best classifier that can predict spectral occupancy.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
  • [1] Machine Learning Based Primary User Emulation Attack Detection
    Camana, Mario R.
    Garcia, Carla E.
    Koo, Insoo
    Shakhov, Vladimir
    2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, : 244 - 248
  • [2] Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
    Alshehri, Abdullah
    Khan, Nayeem
    Alowayr, Ali
    Alghamdi, Mohammed Yahya
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1679 - 1689
  • [3] Detection of Primary User assisted by Machine Learning over Multipath Channels
    Bouallegue, Kais
    Crussiere, Matthieu
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 824 - 829
  • [4] Enhancing IoT Security Through User Categorization and Aberrant Behavior Detection Using RBAC and Machine Learning
    Alshawwa Izzeddin, A.O.
    Bin Yahaya, Nor Adnan
    mahmoud, Ahmed Y.
    International Journal of Advanced Computer Science and Applications, 2024, 15 (12) : 638 - 647
  • [5] Efficient Detection of Irrelevant User Reviews Using Machine Learning
    Kim, Cheolgi
    Kim, Hyeon Gyu
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [6] Predicting User Behavior in e-Commerce Using Machine Learning
    Ketipov, Rumen
    Angelova, Vera
    Doukovska, Lyubka
    Schnalle, Roman
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2023, 23 (03) : 89 - 101
  • [7] Identifying User Behavior Profiles in Ethereum Using Machine Learning Techniques
    Valadares, Julia Almeida
    Oliveira, Vinicius C.
    de Azevedo Sousa, Jose Eduardo
    Bernardino, Heder S.
    Villela, Saulo Moraes
    Vieira, Alex Borges
    Goncalves, Glauber
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 327 - 332
  • [8] A network user's abnormal behavior detection approach based on selective collaborative learning
    Lu, You
    Li, Wei
    Luo, Jun-Zhou
    Jiang, Jian
    Xia, Nu
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (01): : 28 - 40
  • [9] Machine Learning and Recognition of User Tasks for Malware Detection
    Alagrash, Yasamin
    Mohan, Nithasha
    Gollapalli, Sandhya Rani
    Rrushi, Julian
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 73 - 81
  • [10] Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users
    Wang, Huaxia
    Yao, Yu-Dong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) : 4577 - 4588