共 16 条
[1]
Alhakami Wajdi, 2013, 2013 Science and Information Conference (SAI), P796
[2]
Alhakami W, 2014, IJACSA INT J ADV COM, V5
[5]
Ci S., 2007, MIL COMM C 2007 MILC, P1
[6]
A Survey on MAC Strategies for Cognitive Radio Networks
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2012, 14 (01)
:21-44
[7]
Guang L, 2006, WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, P116
[8]
Huayi Wu, 2011, Proceedings of the 2011 International Conference on Internet Computing and Information Services (ICICIS 2011), P353, DOI 10.1109/ICICIS.2011.91
[9]
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
[J].
IEEE NETWORK,
2013, 27 (03)
:46-50
[10]
Li Zhu, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P1110, DOI 10.1109/CSSE.2008.1536