Login / Signup
Location spoofing attack and its countermeasures in database-driven cognitive radio networks.
Kexiong Curtis Zeng
Sreeraksha Kondaji Ramesh
Yaling Yang
Published in:
CNS (2014)
Keyphrases
</>
countermeasures
database driven
cognitive radio networks
spectrum sensing
user centric
information security
power analysis
cognitive radio
security measures
user friendly
design patterns
cyber attacks
differential power analysis
software engineering
web databases
artificial intelligence