Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Khadijeh Afhamisisi"'
Autor:
Kambiz Vahedi, Khadijeh Afhamisisi
Publikováno v:
2021 IEEE International Conference on Big Data (Big Data).
Publikováno v:
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE).
Recent metamorphic malware detection methods based on statistical analysis of malware code and measuring similarity between codes are by far more superior compared with signature-based detection methods; yet, lacking against code obfuscation methods
Cognitive Radio (CR) technology is a solution to solve the lack of spectrum by allowing the secondary user to use licensed bands. There are several potential security challenges for cognitive radio like Jamming, PUE and Lion attack. Lion attack is mu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f823ed9327638d39d39562ad277182f6
With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed to address this concern. In cognitive radio networks, the secondary users can access spe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e5f5e895f4538ea5e95e6fc388dc4f99
Publikováno v:
IETE Journal of Research. 61:492-499
Cognitive radio networks (CRNs) have been introduced in recent years to solve frequency leakage. In these networks, several challenges such as Lion and jamming attacks, giving false sensing information, low accuracy in detection of primary users, and
Publikováno v:
Arabian Journal for Science and Engineering. 39:4609-4616
The main mechanism in IEEE 802.11 to access the medium is distributed coordination function (DCF) as a random access scheme based on carrier sense multiple access with collision avoidance. DCF describes two access techniques for packet transmission,
Publikováno v:
Journal of Circuits, Systems and Computers. 25:1650097
IEEE 802.22 Standard utilizes cognitive radio (CR) techniques to allow sharing unused spectrum band. CR is vulnerable to various attacks such as jamming attacks. This paper has focused on coordinated jamming attacks. A simple strategy for secondary u