Login / Signup
On the achievable rate in a D2D cognitive secondary network under jamming attacks.
Senthuran Arunthavanathan
Leonardo Goratti
Lorenzo Maggi
Francesco De Pellegrini
Kandeepan Sithamparanathan
Published in:
CrownCom (2014)
Keyphrases
</>
cognitive radio
traffic analysis
network anomaly detection
network structure
security threats
information processing
image registration
complex networks
computer networks
traffic load
fault injection
decision making
communication networks
dos attacks
java card
anomaly detection
network attacks