共 31 条
[2]
Araujo A, 2012, P 2 INT C ADV COGN R, P34
[4]
Cognitive Spectrum and its Security Issues
[J].
NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS,
2008,
:565-570
[5]
Brown T.X., 2007, 2 INT C COGN RAD OR
[6]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[7]
Base Station Controlled Spectrum Allocation Technique to Detect the PUE Attack in CWSN
[J].
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1,
2015, 31
:689-698
[8]
A Regression based Spectrum-Sensing Data -Falsification Attack Detection Technique in CWSN
[J].
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015),
2015,
:48-53
[9]
Chen CX, 2012, IEEE GLOB HIGH TECH
[10]
Chen RL, 2008, IEEE INFOCOM SER, P31