DOCUMENT RESOURCES FOR EVERYONE
Technology A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS

1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS Yong…

Documents HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing

1 HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing Xiaofan He, Huaiyu Dai, Senior Member, IEEE and Peng Ning, Senior Member, IEEE Abstract—Collaborative…

Documents FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active Transmissions

Slide 1 FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active Transmissions Tarun Bansal, Bo Chen and Prasun Sinha Department of Computer Science…

Documents 20-15

See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/270272297 Bioinformatics-Inspired Quantized Hard Combination-Based…