Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
Reinforcement learning-based physical cross-layer security and privacy in 6G
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
Byzantine attack and defense in cognitive radio networks: A survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
Advances on security threats and countermeasures for cognitive radio networks: A survey
RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …
with the capability to adapt their operating parameters on the fly based on the radio …
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
AJ Malik, FA Khan - Cluster Computing, 2018 - Springer
A major drawback of signature-based intrusion detection systems is the inability to detect
novel attacks that do not match the known signatures already stored in the database …
novel attacks that do not match the known signatures already stored in the database …
A survey of converging solutions for heterogeneous mobile networks
In 5G systems, the current machine-tomachine communications using Wi-Fi or Bluetooth
provide a good opportunity to dramatically increase overall performance. Converged mobile …
provide a good opportunity to dramatically increase overall performance. Converged mobile …
Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks
Y Fu, Z He - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Collaborative spectrum sensing as a promising approach is widely investigated for
identifying available spectrum in cognitive radio networks. However, such cooperation is …
identifying available spectrum in cognitive radio networks. However, such cooperation is …
A novel kernel SVM algorithm with game theory for network intrusion detection
Y Liu, D Pi - KSII Transactions on Internet and Information Systems …, 2017 - koreascience.kr
Abstract Network Intrusion Detection (NID), an important topic in the field of information
security, can be viewed as a pattern recognition problem. The existing pattern recognition …
security, can be viewed as a pattern recognition problem. The existing pattern recognition …
Extracting projective structure from single perspective views of 3D point sets
CA Rothwell, DA Forsyth, A Zisserman… - … on Computer Vision, 1993 - ieeexplore.ieee.org
A number of recent papers have argued that invariants do not exist for three-dimensional
point sets in general position, which has often been misinterpreted to mean that invariants …
point sets in general position, which has often been misinterpreted to mean that invariants …