Skip to main content

Table 3 Confusion matrices for jamming attack detection

From: Primary user emulation and jamming attack detection in cognitive radio via sparse coding