1 |
김창주, "Cognitive Radio 기술 및 응용," 한국전자과학회지 전자파기술, 제17권, 제2호, 2006년 4월, pp. 3-8.
|
2 |
김창주, "Cognitive Radio 기술동향," 전자통신동향 분석, 제21권, 제4호, 2006년 8월, pp. 62-69.
|
3 |
J. Mitola III, and G. Q. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Communications, Vol. 6, No. 4, 1999, pp. 13-18.
DOI
ScienceOn
|
4 |
Z. Kostic, and N. Sollenberger, "Performance and implementation of dynamic frequency hopping in limited-bandwidth cellular systems," IEEE Transactions on Wireless Communications, Vol. 1, No. 1, Jan., 2002, pp. 28-36.
DOI
ScienceOn
|
5 |
T. Newman, T. Clancy, "Security threats to cognitive radio signal classifiers," Virginia Tech Wireless Personal Communications Symposium, Blacksburg, Va, USA, June 2009.
|
6 |
T. Clancy, N. Goergen, "Security in cognitive radio networks: threats and mitigation," CrownCom, Singapore, May 2008.
|
7 |
R. Chen, J. M. Park, K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," INFOCOM, Apr. 2008, pp. 1876-1884.
|
8 |
W. Wang, H. Li, Y. Sun, Z. Han, "Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks," EURASIP Journal on Advances in Signal Processing, vol. 2010, Article ID 695750, 2010.
|
9 |
A. W. Min, K. G. Shin, X. Hu, "Attack-tolerant distributed sensing for dynamic spectrum access networks," ICNP, Oct. 2009, pp. 294-303.
|
10 |
김미희, 추현승, "인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘," 한국인터넷정보학회 논문지, 11권, 6호, 2010. 12.
|
11 |
W. S. Jeon, D. G. Jeong, J. A. Han, G. Ko, M. S. Song, "An efficient quiet period management scheme for cognitive radio systems," IEEE Trans. Wireless Commun., Feb. 2008, vol. 7, no. 2, pp. 505-509.
DOI
|
12 |
H. Kim, K. G. Shin, "In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?," ACM international Conference on Mobile Computing and Networking (MobiCom), Sep. 2008, pp. 14-25.
|
13 |
E. Visotsky, S. Kuffher, R. Peterson, "On collaborative detection of TV transmissions in support of dynamic spectrum sharing," IEEE DySPAN, Nov. 2005, pp. 338-345.
|
14 |
A. Ghasemi, E. S. Sousa, "Opportunistic spectrum access in fading channels through collaborative sensing," Journal of Communications, 2007, vol. 2, no. 2, pp. 71-82.
|
15 |
G. Ganesan, Y. Li, "Cooperative spectrum sensing in cognitive radio, part II: multiuser networks," IEEE Transactions on Wireless Communications, 2007, vol. 6, no. 6, pp. 2214-2222.
DOI
|
16 |
임형진, 이정근, 김문성, "안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구," 한국 인터넷정보학회, 9권, 6호, 2008년, pp. 73-79.
|
17 |
김태경, "디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명 기법에 관한 연구", 디지털산업정보학회, 6권, 3호, 2010. 9.
|
18 |
M. Burrows, M. Abadi, R. Needham: A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February, 1990.
DOI
|
19 |
W. C. Suski, M. A. Temple, M. J. Mendenhall, R. F. Mills, "Using Spectral Fingerprints to Improve Wireless Network Security," GLOBECOM, Dec. 2008, pp. 1-5.
|
20 |
M. Strasser, C. Popper, S. Capkun, " Efficient uncoordinated FHSS anti-jamming communication," International Symposium on Mobile Ad Hoc Networking and Computing. May 2009, pp. 207-218.
|
21 |
Y. Liu, P. Ning. H. Dai, A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," IEEE INFOCOM, Mar. 2010, pp. 1-9.
|