Interference exploitation for enhanced security in D2D spectrum sharing networks.
Wei WangKah Chan TehKwok Hung LiPublished in: ICC (2017)
Keyphrases
- cognitive radio networks
- access control
- information security
- network security
- enterprise network
- spectrum sensing
- security requirements
- computer networks
- intrusion detection
- social networks
- security policies
- computer security
- security issues
- statistical databases
- knowledge sharing
- pose estimation
- multipath
- security analysis
- security level
- communication systems
- heterogeneous networks
- security systems
- cognitive radio
- image registration
- bayesian networks
- information systems