TY - CHAP AU - Huang, J. AU - Xing, G. AU - Zhou, G. AU - Zhou, R. PY - 2010 DA - 2010// TI - Beyond co-existence: exploiting WiFi white space for Zigbee performance assurance BT - 18th IEEE International Conference on Network Protocols (ICNP), 2010 ID - Huang2010 ER - TY - CHAP AU - Chen, R. AU - Park, J. M. PY - 2006 DA - 2006// TI - Ensuring trustworthy spectrum sensing in cognitive radio networks BT - 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, SDR ’06 UR - https://doi.org/10.1109/SDR.2006.4286333 DO - 10.1109/SDR.2006.4286333 ID - Chen2006 ER - TY - JOUR AU - Chen, R. AU - Park, J. M. AU - Reed, J. PY - 2008 DA - 2008// TI - Defense against primary user emulation attacks in cognitive radio networks JO - Selected Areas Commun., IEEE J VL - 26 UR - https://doi.org/10.1109/JSAC.2008.080104 DO - 10.1109/JSAC.2008.080104 ID - Chen2008 ER - TY - CHAP AU - Chen, Z. AU - Cooklev, T. AU - Chen, C. AU - Pomalaza-Raez, C. PY - 2009 DA - 2009// TI - Modeling primary user emulation attacks and defenses in cognitive radio networks BT - IEEE 28th International Performance Computing and Communications Conference (IPCCC), 2009 UR - https://doi.org/10.1109/PCCC.2009.5403815 DO - 10.1109/PCCC.2009.5403815 ID - Chen2009 ER - TY - CHAP AU - Jin, Z. AU - Anand, S. AU - Subbalakshmi, K. PY - 2009 DA - 2009// TI - Detecting primary user emulation attacks in dynamic spectrum access networks BT - IEEE International Conference on Communications, 2009. ICC ’09 ID - Jin2009 ER - TY - CHAP AU - Yuan, Z. AU - Niyato, D. AU - Li, H. AU - Han, Z. PY - 2011 DA - 2011// TI - Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks BT - IEEE Wireless Communications and Networking Conference (WCNC), 2011 UR - https://doi.org/10.1109/WCNC.2011.5779201 DO - 10.1109/WCNC.2011.5779201 ID - Yuan2011 ER - TY - CHAP AU - Huang, L. AU - Xie, L. AU - Yu, H. AU - Wang, W. AU - Yao, Y. PY - 2010 DA - 2010// TI - Anti-PUE attack based on joint position verification in cognitive radio networks BT - International Conference on Communications and Mobile Computing (CMC), 2010, Volume 2 UR - https://doi.org/10.1109/CMC.2010.26 DO - 10.1109/CMC.2010.26 ID - Huang2010 ER - TY - CHAP AU - Zhao, C. AU - Wang, W. AU - Huang, L. AU - Yao, Y. PY - 2009 DA - 2009// TI - Anti-PUE attack base on the transmitter fingerprint identification in cognitive radio BT - 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom ’09 ID - Zhao2009 ER - TY - CHAP AU - Hao, D. AU - Sakurai, K. PY - 2012 DA - 2012// TI - A differential game approach to mitigating primary user emulation attacks in cognitive radio networks BT - IEEE 26th International Conference on Advanced Information Networking and Applications, 2012 UR - https://doi.org/10.1109/AINA.2012.84 DO - 10.1109/AINA.2012.84 ID - Hao2012 ER - TY - JOUR AU - Wang, Q. PY - 2011 DA - 2011// TI - Packet traffic: a good data source for wireless sensor network modeling and anomaly detection JO - Netw., IEEE VL - 25 UR - https://doi.org/10.1109/MNET.2011.5772056 DO - 10.1109/MNET.2011.5772056 ID - Wang2011 ER - TY - CHAP AU - Liu, Y. AU - Han, K. PY - 2010 DA - 2010// TI - Behavior-based attack detection and reporting in wireless sensor networks BT - Third International Symposium on Electronic Commerce and Security (ISECS), 2010 UR - https://doi.org/10.1109/ISECS.2010.53 DO - 10.1109/ISECS.2010.53 ID - Liu2010 ER - TY - CHAP AU - Wang, F. AU - Gao, J. PY - 2010 DA - 2010// TI - Behavior monitoring framework in large-scale wireless sensor networks BT - IEEE 29th International Performance Computing and Communications Conference (IPCCC), 2010 ID - Wang2010 ER - TY - CHAP AU - Wang, Q. AU - Zhang, T. PY - 2007 DA - 2007// TI - Detecting anomaly node behavior in wireless sensor networks BT - 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW ’07, Volume 1 PB - Niagara Falls CY - Ontario ID - Wang2007 ER - TY - JOUR AU - Rajasegarar, S. AU - Leckie, C. AU - Palaniswami, M. PY - 2008 DA - 2008// TI - Anomaly detection in wireless sensor networks JO - Wireless Commun., IEEE VL - 15 UR - https://doi.org/10.1109/MWC.2008.4599219 DO - 10.1109/MWC.2008.4599219 ID - Rajasegarar2008 ER - TY - CHAP AU - Blesa, J. AU - Romero, E. AU - Vallejo, J. C. AU - Villanueva, D. AU - Araujo, A. PY - 2011 DA - 2011// TI - A cognitive simulator for wireless sensor networks BT - 5th International Symposium of Ubiquitous Computing and Ambient Intelligence, 2011, UCAMI 2011 ID - Blesa2011 ER - TY - CHAP AU - Pediaditakis, D. AU - Tselishchev, Y. AU - Boulis, A. PY - 2010 DA - 2010// TI - Performance and scalability evaluation of the Castalia wireless sensor network simulator BT - Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, SIMUTools ‘10, ICST ID - Pediaditakis2010 ER -