Journal articles on the topic 'Primary user emulation attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Primary user emulation attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shetty, Sachin, Meena Thanu, and Ravi Ramachandran. "Cognitive Radio: Primary User Emulation Attacks and Remedies." Recent Patents on Computer Sciencee 5, no. 2 (June 1, 2012): 103–8. http://dx.doi.org/10.2174/2213275911205020103.
Full textLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (July 4, 2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Full textYu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing cognitive radio networks against primary user emulation attacks." IEEE Network 29, no. 4 (July 2015): 68–74. http://dx.doi.org/10.1109/mnet.2015.7166193.
Full textYu, Rong, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. "Securing Cognitive Radio Networks against Primary User Emulation Attacks." IEEE Network 30, no. 6 (November 2016): 62–69. http://dx.doi.org/10.1109/mnet.2016.1200149nm.
Full textLeón, Olga, Juan Hernández-Serrano, and Miguel Soriano. "Cooperative detection of primary user emulation attacks in CRNs." Computer Networks 56, no. 14 (September 2012): 3374–84. http://dx.doi.org/10.1016/j.comnet.2012.05.008.
Full textShrivastava, Shivanshu, A. Rajesh, and P. K. Bora. "Defense against primary user emulation attacks from the secondary user throughput perspective." AEU - International Journal of Electronics and Communications 84 (February 2018): 131–43. http://dx.doi.org/10.1016/j.aeue.2017.11.012.
Full textChen, Ruiliang, Jung-Min Park, and Jeffrey H. Reed. "Defense against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 26, no. 1 (January 2008): 25–37. http://dx.doi.org/10.1109/jsac.2008.080104.
Full textMrabet, Zakaria El, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, and Naima Kaabouch. "Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter." Journal of Sensor and Actuator Networks 7, no. 3 (July 4, 2018): 26. http://dx.doi.org/10.3390/jsan7030026.
Full textJin, Z., S. Anand, and K. P. Subbalakshmi. "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks." IEEE Transactions on Communications 60, no. 9 (September 2012): 2635–43. http://dx.doi.org/10.1109/tcomm.2012.071812.100729.
Full textTa, Duc-Tuyen, Nhan Nguyen-Thanh, Patrick Maille, and Van-Tam Nguyen. "Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks." IEEE Transactions on Cognitive Communications and Networking 4, no. 3 (September 2018): 582–96. http://dx.doi.org/10.1109/tccn.2018.2826552.
Full textAlcala’ Garrido, Hassel Aurora, Mario E. Rivero-Angeles, and Eleazar Aguirre Anaya. "Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection." Journal of Sensors 2019 (April 28, 2019): 1–14. http://dx.doi.org/10.1155/2019/6950534.
Full textSrinivasan, Sundar, KB Shivakumar, and Muazzam Mohammad. "Semi-supervised machine learning for primary user emulation attack detection and prevention through core-based analytics for cognitive radio networks." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771986036. http://dx.doi.org/10.1177/1550147719860365.
Full textGarcía-Otero, Mariano, and Adrián Población-Hernández. "Location Aided Cooperative Detection of Primary User Emulation Attacks in Cognitive Wireless Sensor Networks Using Nonparametric Techniques." Journal of Sensors 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/9571592.
Full textXIE, Xianzhong, Yuan FANG, and Bin MA. "Robust cooperative spectrum sensing against primary user emulation attacks based on cyclostationarity." SCIENTIA SINICA Informationis 46, no. 6 (April 13, 2016): 789–99. http://dx.doi.org/10.1360/n112015-00168.
Full textLi, Kaili, and Jinting Wang. "Optimal Joining Strategies in Cognitive Radio Networks Under Primary User Emulation Attacks." IEEE Access 7 (2019): 183812–22. http://dx.doi.org/10.1109/access.2019.2957435.
Full textYuan, Zhou, Dusit Niyato, Husheng Li, Ju Bin Song, and Zhu Han. "Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 30, no. 10 (November 2012): 1850–60. http://dx.doi.org/10.1109/jsac.2012.121102.
Full textPonnusamy, Vijayakumar, Kottilingam Kottursamy, T. Karthick, M. B. Mukeshkrishnan, D. Malathi, and Tariq Ahamed Ahanger. "Primary user emulation attack mitigation using neural network." Computers & Electrical Engineering 88 (December 2020): 106849. http://dx.doi.org/10.1016/j.compeleceng.2020.106849.
Full textJin, Z., S. Anand, and K. P. Subbalakshmi. "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing." ACM SIGMOBILE Mobile Computing and Communications Review 13, no. 2 (September 25, 2009): 74–85. http://dx.doi.org/10.1145/1621076.1621084.
Full textSaber, M. J., and S. M. S. Sadough. "Optimal soft combination for multiple antenna energy detection under primary user emulation attacks." AEU - International Journal of Electronics and Communications 69, no. 9 (September 2015): 1181–88. http://dx.doi.org/10.1016/j.aeue.2015.04.011.
Full textCadena-Muñoz, Ernesto, Luis Fernando Pedraza-Martínez, and Enrique Rodríguez-Colina. "Primary user emulation characterization in mobile cognitive radio networks." Visión electrónica 14, no. 1 (January 31, 2020): 26–34. http://dx.doi.org/10.14483/22484728.16351.
Full textMishra, Nikita, Sumit Srivastava, and Shivendra Nath Sharan. "Countermeasures for Primary User Emulation Attack: A Comprehensive Review." Wireless Personal Communications 115, no. 1 (June 16, 2020): 827–58. http://dx.doi.org/10.1007/s11277-020-07600-y.
Full textShrivastava, Shivanshu, Bin Chen, and Hui Wang. "DQN Learning Based Defense Against Smart Primary User Emulation Attacks in Cooperative Sensing Systems." IEEE Access 9 (2021): 163791–814. http://dx.doi.org/10.1109/access.2021.3131339.
Full textLe, Trong Nghia, Wen-Long Chin, and Wei-Che Kao. "Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio Networks." IEEE Communications Letters 19, no. 5 (May 2015): 799–802. http://dx.doi.org/10.1109/lcomm.2015.2399920.
Full textAlahmadi, Ahmed, Mai Abdelhakim, Jian Ren, and Tongtong Li. "Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard." IEEE Transactions on Information Forensics and Security 9, no. 5 (May 2014): 772–81. http://dx.doi.org/10.1109/tifs.2014.2310355.
Full textNguyen, Nam Tuan, Rong Zheng, and Zhu Han. "On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification." IEEE Transactions on Signal Processing 60, no. 3 (March 2012): 1432–45. http://dx.doi.org/10.1109/tsp.2011.2178407.
Full textXie, Xiongwei, and Weichao Wang. "Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding." Procedia Computer Science 21 (2013): 430–35. http://dx.doi.org/10.1016/j.procs.2013.09.057.
Full textLakshmibai, T., and C. Parthasarathy. "Self B - Adaptive Key Generation for Primary Users in Cognitive Radio Networks for Less Prone Primary User Emulation Attacks." International Journal of Future Generation Communication and Networking 11, no. 1 (January 31, 2018): 1–12. http://dx.doi.org/10.14257/ijfgcn.2018.11.1.01.
Full textVaziri Yazdi, Seyed Abdolazim, and Mahdieh Ghazvini. "Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks." Wireless Personal Communications 108, no. 4 (May 21, 2019): 2261–77. http://dx.doi.org/10.1007/s11277-019-06521-9.
Full textMirza, Muhammad Ayzed, Mudassar Ahmad, Muhammad Asif Habib, Nasir Mahmood, C. M. Nadeem Faisal, and Usman Ahmad. "CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks." Journal of Supercomputing 74, no. 10 (April 17, 2018): 5082–98. http://dx.doi.org/10.1007/s11227-018-2378-6.
Full textAvila, Jayapalan, and Karrupasamy Thenmozhi. "Authentication scheme to combat a primary user emulation attack against cognitive radio users." Security and Communication Networks 8, no. 18 (October 2, 2015): 4242–53. http://dx.doi.org/10.1002/sec.1339.
Full textAmmar, Mahmoud A., and Salahedin A. Rehan. "Cognitive Radio Networks Based on Users' Reputation Scheme." AL-MUKHTAR JOURNAL OF SCIENCES 36, no. 2 (June 30, 2021): 129–34. http://dx.doi.org/10.54172/mjsc.v36i2.35.
Full textNguyen Thanh, Nhan, Philippe Ciblat, Anh T. Pham, and Van-Tam Nguyen. "Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks." IEEE Transactions on Wireless Communications 14, no. 9 (September 2015): 4981–93. http://dx.doi.org/10.1109/twc.2015.2430865.
Full textYadav, Kuldeep, Binod Prasad, Abhijit Bhowmick, Sanjay Dhar Roy, and Sumit Kundu. "Throughput performance under primary user emulation attack in cognitive radio networks." International Journal of Communication Systems 30, no. 18 (July 20, 2017): e3371. http://dx.doi.org/10.1002/dac.3371.
Full textChin, Wen Long, Trong Nghia Le, Chun Lin Tseng, Wei Che Kao, Chun Shen Tsai, and Chun Wei Kao. "Cooperative detection of primary user emulation attacks based on channel-tap power in mobile cognitive radio networks." International Journal of Ad Hoc and Ubiquitous Computing 15, no. 4 (2014): 263. http://dx.doi.org/10.1504/ijahuc.2014.061005.
Full textLi, Husheng, and Zhu Han. "Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics." IEEE Transactions on Wireless Communications 9, no. 11 (November 2010): 3566–77. http://dx.doi.org/10.1109/twc.2010.091510.100629.
Full textLi, Husheng, and Zhu Han. "Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics." IEEE Transactions on Wireless Communications 10, no. 1 (January 2011): 274–83. http://dx.doi.org/10.1109/twc.2010.112310.100630.
Full textGhauri, Sabir, Chuang Yang, Rui Wang, and Hui Sun. "Analysis of an approach to reducing drops of secondary user on primary user emulation attack." International Journal of Computer Applications in Technology 61, no. 4 (2019): 253. http://dx.doi.org/10.1504/ijcat.2019.10024876.
Full textSun, Hui, Chuang Yang, Rui Wang, and Sabir Ghauri. "Analysis of an approach to reducing drops of secondary user on primary user emulation attack." International Journal of Computer Applications in Technology 61, no. 4 (2019): 253. http://dx.doi.org/10.1504/ijcat.2019.103302.
Full textSharifi, Abbas Ali, Morteza Sharifi, and Mir Javad Musevi Niya. "Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks." IETE Journal of Research 62, no. 2 (September 28, 2015): 205–11. http://dx.doi.org/10.1080/03772063.2015.1083907.
Full textKarimi, Mohammad, and Seyed Mohammad Sajad Sadough. "Efficient Transmission Strategy for Cognitive Radio Systems Under Primary User Emulation Attack." IEEE Systems Journal 12, no. 4 (December 2018): 3767–74. http://dx.doi.org/10.1109/jsyst.2017.2747594.
Full textKakalou, Ioanna, and Kostas E. Psannis. "Coordination Without Collaboration in Imperfect Games: The Primary User Emulation Attack Example." IEEE Access 6 (2018): 5402–14. http://dx.doi.org/10.1109/access.2018.2791519.
Full textRehman, Aasia, and Deo Prakash. "Detection of PUE Attack in CRN with Reduced Error in Location Estimation Using Novel Bat Algorithm." International Journal of Wireless Networks and Broadband Technologies 6, no. 2 (July 2017): 1–25. http://dx.doi.org/10.4018/ijwnbt.2017070101.
Full textArmi, N., W. Gharibi, and W. Z. Khan. "Error rate detection due to primary user emulation attack in cognitive radio networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5385. http://dx.doi.org/10.11591/ijece.v10i5.pp5385-5391.
Full textHaghighat, M., and S. M. S. Sadough. "Smart primary user emulation in cognitive radio networks: defence strategies against radio-aware attacks and robust spectrum sensing." Transactions on Emerging Telecommunications Technologies 26, no. 9 (August 12, 2014): 1154–64. http://dx.doi.org/10.1002/ett.2848.
Full textElghamrawy, Sally M. "Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm." Future Generation Computer Systems 109 (August 2020): 479–87. http://dx.doi.org/10.1016/j.future.2018.08.022.
Full textArun, S., and G. Umamaheswari. "Cross Layer Design Based Channel Aware Multipath Routing Towards Primary User Emulation Attack." Journal of Computational and Theoretical Nanoscience 14, no. 11 (November 1, 2017): 5209–14. http://dx.doi.org/10.1166/jctn.2017.7131.
Full textTan, Y., S. Sengupta, and K. P. Subbalakshmi. "Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach." IET Communications 6, no. 8 (2012): 964. http://dx.doi.org/10.1049/iet-com.2010.0573.
Full textAvila, J., and K. Thenmozhi. "Error Control Code Based Resistance against Primary User Emulation Attack in Cognitive Radio." Asian Journal of Scientific Research 8, no. 3 (June 15, 2015): 324–32. http://dx.doi.org/10.3923/ajsr.2015.324.332.
Full textCHATTERJEE, PINAKI SANKAR, and MONIDEEPA ROY. "Detecting PUE Attack by Measuring Aberrational Node Behavior in CWSN." Journal of Interconnection Networks 18, no. 01 (March 2018): 1850004. http://dx.doi.org/10.1142/s0219265918500044.
Full textMuñoz, Ernesto Cadena, Luis Fernando Pedraza, and Cesar Augusto Hernández. "Machine Learning Techniques Based on Primary User Emulation Detection in Mobile Cognitive Radio Networks." Sensors 22, no. 13 (June 21, 2022): 4659. http://dx.doi.org/10.3390/s22134659.
Full text