Login / Signup

Understanding conditions that lead to emulation attacks in dynamic spectrum access.

Ryan W. ThomasBrett J. BorghettiRamakant S. KomaliPetri Mähönen
Published in: IEEE Commun. Mag. (2011)
Keyphrases
  • dynamic environments
  • access control
  • real time
  • neural network
  • data mining
  • genetic algorithm
  • artificial intelligence
  • sufficient conditions
  • computer security
  • traffic analysis