Unauthorized Access Detection in Underlay Cognitive Satellite Networks (original) (raw)

Principles and Practices of Network Security

Dr Ihtiram Raza Khan

Zenodo (CERN European Organization for Nuclear Research), 2023

View PDFchevron_right

Security in Computer Networks: Threats, Challenges, and Protection

Malvina Niklekaj

Ingenious, 2022

View PDFchevron_right

Misbehavior Scenarios in Cognitive Radio Networks

Alexandru Popescu

Future Internet, 2010

View PDFchevron_right

Security Analysis on Cognitive Radio Network

Amitabha Chakrabarty

Advances in Intelligent Systems and Computing, 2018

View PDFchevron_right

Anomalous spectrum usage attack detection in cognitive radio wireless networks

Lijun Qian

2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011

View PDFchevron_right

Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks

Sachin Shetty

International Journal of Networking and Computing, 2017

View PDFchevron_right

Robust Authentication and Session Key Agreement Protocol for Satellite Communications

somayeh soltani

Computers, Materials & Continua

View PDFchevron_right

Quickest detection of denial-of-service attacks in cognitive wireless networks

Lijun Qian

2012 IEEE Conference on Technologies for Homeland Security (HST), 2012

View PDFchevron_right

Covert communication networks

Riccardo Bettati

2013

View PDFchevron_right

Cross-protocol attacks

Mohamed Kaaniche

2021

View PDFchevron_right

Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

Ranjith Balakrishnan

2015

View PDFchevron_right

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

Haythem Bany salameh

Telecommunication Systems, 2017

View PDFchevron_right

Latest Challenges and Trends in Network Security: Facing Cyber Threats in the Digital Era

Charlista Gozal

Journal of Artificial Intelligence and Engineering Applications, 2024

View PDFchevron_right

The Security Challenges Emerging from the Technological Developments

Ricardo Montenegro

Mobile Networks and Applications, 2019

View PDFchevron_right

Border Management of Cyberspace, First Step of Cyber Defense

Mohsen Janparvar

Research on Humanities and Social Sciences, 2015

View PDFchevron_right

Int. J. Sci. Res. in Network Security and Communication

Dr. Shivlal Mewada

View PDFchevron_right

Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach

Lijun Qian

Journal of Communications, 2013

View PDFchevron_right

Cognitive radio network as wireless sensor network (II): Security consideration

Terry W Guo

Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON), 2011

View PDFchevron_right

Cyber physical systems security: Analysis, challenges and solutions

Yosef Ashibani

Computers & Security, 2017

View PDFchevron_right

Intelligent Anomaly Detection System for IoT

Reinaldo Jose Ramon Scappini

IEEE International Conference on Cloud Computing Technology and Science, 2021

View PDFchevron_right

Developing a Security Typed Java Servlet

Doaa Salem

2008 The Fourth International Conference on Information Assurance and Security, 2008

View PDFchevron_right

Technical Report: Evasion

Luke Stephens Kehoe

2016

View PDFchevron_right

Physical Layer Security for Internet of Things

Nhật Minh Hà

Wireless Communications and Mobile Computing, 2019

View PDFchevron_right

Information Security Policies

Jatinder N.d Gupta

Handbook of Research on Information Security and Assurance

View PDFchevron_right

A Benign Invasion Response

Deni Elliott

Teaching Ethics, 2010

View PDFchevron_right

Implementation of e-patrolling using J2EE N-Tier Architecture

Madan Mohan Prasad Yadav

International Journal of Computer Applications, 2013

View PDFchevron_right

Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network

sanjeevkumar angadi

SSRG international journal of electronics and communication engineering, 2024

View PDFchevron_right

Security of Information and Communication Technologies

Zoran Cekerevac

FBIM Transactions, 2019

View PDFchevron_right

Cooperative Communication in Physical Layer Security: Technologies and Challenges

poonam jindal

Wireless Personal Communications, 2019

View PDFchevron_right

Random Neural Network Based Intelligent Intrusion Detection for Wireless Sensor Networks

Ahmed Saed

Procedia Computer Science, 2016

View PDFchevron_right

Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks

Patrick Maillé

IEEE Transactions on Cognitive Communications and Networking, 2018

View PDFchevron_right

Wireless Network Security : A Guide for Small and Medium Premises

Hoa Nguyễn

2018

View PDFchevron_right

Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

Sandhya Kaushik

IEEE Transactions on Mobile Computing, 2008

View PDFchevron_right

Security for Internet of Things: The SerIoT Project

Tadeusz Czachorski

2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018

View PDFchevron_right

Network Control and Engineering for QoS, Security and Mobility, III

A. al-Naamany

IFIP International Federation for Information Processing, 2005

View PDFchevron_right