Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

Advances on security threats and countermeasures for cognitive radio networks: A survey

RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …

A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection

AJ Malik, FA Khan - Cluster Computing, 2018 - Springer
A major drawback of signature-based intrusion detection systems is the inability to detect
novel attacks that do not match the known signatures already stored in the database …

A survey of converging solutions for heterogeneous mobile networks

M Jo, T Maksymyuk, RL Batista… - IEEE Wireless …, 2014 - ieeexplore.ieee.org
In 5G systems, the current machine-tomachine communications using Wi-Fi or Bluetooth
provide a good opportunity to dramatically increase overall performance. Converged mobile …

Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks

Y Fu, Z He - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Collaborative spectrum sensing as a promising approach is widely investigated for
identifying available spectrum in cognitive radio networks. However, such cooperation is …

A novel kernel SVM algorithm with game theory for network intrusion detection

Y Liu, D Pi - KSII Transactions on Internet and Information Systems …, 2017 - koreascience.kr
Abstract Network Intrusion Detection (NID), an important topic in the field of information
security, can be viewed as a pattern recognition problem. The existing pattern recognition …

Extracting projective structure from single perspective views of 3D point sets

CA Rothwell, DA Forsyth, A Zisserman… - … on Computer Vision, 1993 - ieeexplore.ieee.org
A number of recent papers have argued that invariants do not exist for three-dimensional
point sets in general position, which has often been misinterpreted to mean that invariants …