Login / Signup
Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.
Yi Tan
Kai Hong
Shamik Sengupta
Koduvayur P. Subbalakshmi
Published in:
ICC (2011)
Keyphrases
</>
social networks
data mining
computer networks
efficient implementation
ddos attacks
malicious users
intrusion detection
hardware implementation
countermeasures
security threats
traffic analysis