Unauthorized Access Detection in Underlay Cognitive Satellite Networks (original) (raw)
Related papers
Principles and Practices of Network Security
Zenodo (CERN European Organization for Nuclear Research), 2023
Security in Computer Networks: Threats, Challenges, and Protection
Ingenious, 2022
Misbehavior Scenarios in Cognitive Radio Networks
Future Internet, 2010
Security Analysis on Cognitive Radio Network
Advances in Intelligent Systems and Computing, 2018
Anomalous spectrum usage attack detection in cognitive radio wireless networks
2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks
International Journal of Networking and Computing, 2017
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
Computers, Materials & Continua
Quickest detection of denial-of-service attacks in cognitive wireless networks
2012 IEEE Conference on Technologies for Homeland Security (HST), 2012
2013
2021
Distributed detection of flooding and gray hole attacks in Wireless Sensor Network
2015
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
Telecommunication Systems, 2017
Latest Challenges and Trends in Network Security: Facing Cyber Threats in the Digital Era
Journal of Artificial Intelligence and Engineering Applications, 2024
The Security Challenges Emerging from the Technological Developments
Mobile Networks and Applications, 2019
Border Management of Cyberspace, First Step of Cyber Defense
Research on Humanities and Social Sciences, 2015
Int. J. Sci. Res. in Network Security and Communication
Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach
Journal of Communications, 2013
Cognitive radio network as wireless sensor network (II): Security consideration
Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON), 2011
Cyber physical systems security: Analysis, challenges and solutions
Computers & Security, 2017
Intelligent Anomaly Detection System for IoT
IEEE International Conference on Cloud Computing Technology and Science, 2021
Developing a Security Typed Java Servlet
2008 The Fourth International Conference on Information Assurance and Security, 2008
2016
Physical Layer Security for Internet of Things
Wireless Communications and Mobile Computing, 2019
Handbook of Research on Information Security and Assurance
Teaching Ethics, 2010
Implementation of e-patrolling using J2EE N-Tier Architecture
International Journal of Computer Applications, 2013
Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network
SSRG international journal of electronics and communication engineering, 2024
Security of Information and Communication Technologies
FBIM Transactions, 2019
Cooperative Communication in Physical Layer Security: Technologies and Challenges
Wireless Personal Communications, 2019
Random Neural Network Based Intelligent Intrusion Detection for Wireless Sensor Networks
Procedia Computer Science, 2016
Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Transactions on Cognitive Communications and Networking, 2018
Wireless Network Security : A Guide for Small and Medium Premises
2018
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
IEEE Transactions on Mobile Computing, 2008
Security for Internet of Things: The SerIoT Project
2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
Network Control and Engineering for QoS, Security and Mobility, III
IFIP International Federation for Information Processing, 2005