Login / Signup

Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.

Yi TanKai HongShamik SenguptaKoduvayur P. Subbalakshmi
Published in: ICC (2011)
Keyphrases
  • social networks
  • data mining
  • computer networks
  • efficient implementation
  • ddos attacks
  • malicious users
  • intrusion detection
  • hardware implementation
  • countermeasures
  • security threats
  • traffic analysis