Login / Signup
Spectrum Sensing Data Falsification Attack Reputation and Q-Out-of-M Rule Security Scheme.
Mthulisi Velempini
Issah Ngomane
Sekgoari Semaka Mapunya
Published in:
ICICT (2) (2021)
Keyphrases
</>
data processing
data collection
data analysis
data mining techniques
information systems
data sources
low cost
intrusion detection
information security
cognitive radio networks