References
- 김창주, "Cognitive Radio 기술 및 응용," 한국전자과학회지 전자파기술, 제17권, 제2호, 2006년 4월, pp. 3-8.
- 김창주, "Cognitive Radio 기술동향," 전자통신동향 분석, 제21권, 제4호, 2006년 8월, pp. 62-69.
- J. Mitola III, and G. Q. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Communications, Vol. 6, No. 4, 1999, pp. 13-18. https://doi.org/10.1109/98.788210
- Z. Kostic, and N. Sollenberger, "Performance and implementation of dynamic frequency hopping in limited-bandwidth cellular systems," IEEE Transactions on Wireless Communications, Vol. 1, No. 1, Jan., 2002, pp. 28-36. https://doi.org/10.1109/7693.975442
- T. Newman, T. Clancy, "Security threats to cognitive radio signal classifiers," Virginia Tech Wireless Personal Communications Symposium, Blacksburg, Va, USA, June 2009.
- T. Clancy, N. Goergen, "Security in cognitive radio networks: threats and mitigation," CrownCom, Singapore, May 2008.
- R. Chen, J. M. Park, K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," INFOCOM, Apr. 2008, pp. 1876-1884.
- W. Wang, H. Li, Y. Sun, Z. Han, "Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks," EURASIP Journal on Advances in Signal Processing, vol. 2010, Article ID 695750, 2010.
- A. W. Min, K. G. Shin, X. Hu, "Attack-tolerant distributed sensing for dynamic spectrum access networks," ICNP, Oct. 2009, pp. 294-303.
- 김미희, 추현승, "인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘," 한국인터넷정보학회 논문지, 11권, 6호, 2010. 12.
- W. S. Jeon, D. G. Jeong, J. A. Han, G. Ko, M. S. Song, "An efficient quiet period management scheme for cognitive radio systems," IEEE Trans. Wireless Commun., Feb. 2008, vol. 7, no. 2, pp. 505-509. https://doi.org/10.1109/TWC.2008.060867
- H. Kim, K. G. Shin, "In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?," ACM international Conference on Mobile Computing and Networking (MobiCom), Sep. 2008, pp. 14-25.
- E. Visotsky, S. Kuffher, R. Peterson, "On collaborative detection of TV transmissions in support of dynamic spectrum sharing," IEEE DySPAN, Nov. 2005, pp. 338-345.
- A. Ghasemi, E. S. Sousa, "Opportunistic spectrum access in fading channels through collaborative sensing," Journal of Communications, 2007, vol. 2, no. 2, pp. 71-82.
- G. Ganesan, Y. Li, "Cooperative spectrum sensing in cognitive radio, part II: multiuser networks," IEEE Transactions on Wireless Communications, 2007, vol. 6, no. 6, pp. 2214-2222. https://doi.org/10.1109/TWC.2007.05776
- 임형진, 이정근, 김문성, "안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구," 한국 인터넷정보학회, 9권, 6호, 2008년, pp. 73-79.
- 김태경, "디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명 기법에 관한 연구", 디지털산업정보학회, 6권, 3호, 2010. 9.
- M. Burrows, M. Abadi, R. Needham: A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February, 1990. https://doi.org/10.1145/77648.77649
- W. C. Suski, M. A. Temple, M. J. Mendenhall, R. F. Mills, "Using Spectral Fingerprints to Improve Wireless Network Security," GLOBECOM, Dec. 2008, pp. 1-5.
- M. Strasser, C. Popper, S. Capkun, " Efficient uncoordinated FHSS anti-jamming communication," International Symposium on Mobile Ad Hoc Networking and Computing. May 2009, pp. 207-218.
- Y. Liu, P. Ning. H. Dai, A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," IEEE INFOCOM, Mar. 2010, pp. 1-9.