Login / Signup

Spectrum Sensing Data Falsification Attack Reputation and Q-Out-of-M Rule Security Scheme.

Mthulisi VelempiniIssah NgomaneSekgoari Semaka Mapunya
Published in: ICICT (2) (2021)
Keyphrases
  • data processing
  • data collection
  • data analysis
  • data mining techniques
  • information systems
  • data sources
  • low cost
  • intrusion detection
  • information security
  • cognitive radio networks