ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A particle swarm optimization based algorithm for primary user emulation attack detection
2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
◽
10.1109/ccwc.2018.8301616
◽
2018
◽
Cited By ~ 9
Author(s):
Wassim Fassi Fihri
◽
Youness Arjoune
◽
Hassan El Ghazi
◽
Naima Kaabouch
◽
Badr Abou El Majd
Keyword(s):
Particle Swarm Optimization
◽
Particle Swarm
◽
Primary User
◽
Attack Detection
◽
Swarm Optimization
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
Related Documents
Cited By
References
A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection
Wireless Personal Communications
◽
10.1007/s11277-020-07900-3
◽
2021
◽
Author(s):
Wassim Fassi Fihri
◽
Hassan El Ghazi
◽
Badr Abou El Majd
Keyword(s):
Particle Swarm Optimization
◽
Particle Swarm
◽
Primary User
◽
Attack Detection
◽
Swarm Optimization
◽
Multi Objective
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks
2018 35th National Radio Science Conference (NRSC)
◽
10.1109/nrsc.2018.8354378
◽
2018
◽
Cited By ~ 6
Author(s):
Walid R. Ghanem
◽
Reem Essam
◽
Moawad Dessouky
Keyword(s):
Particle Swarm Optimization
◽
Cognitive Radio
◽
Cognitive Radio Networks
◽
Particle Swarm
◽
Primary User
◽
Radio Networks
◽
Swarm Optimization
◽
Primary User Emulation Attack
◽
Primary User Emulation
◽
Detection And Localization
Download Full-text
An improved primary user emulation attack detection in cognitive radio networks based on firefly optimization algorithm
2016 33rd National Radio Science Conference (NRSC)
◽
10.1109/nrsc.2016.7450851
◽
2016
◽
Cited By ~ 11
Author(s):
Walid R. Ghanem
◽
Mona Shokair
◽
Moawad I. Desouky
Keyword(s):
Cognitive Radio
◽
Cognitive Radio Networks
◽
Optimization Algorithm
◽
Primary User
◽
Radio Networks
◽
Attack Detection
◽
Primary User Emulation Attack
◽
Primary User Emulation
◽
Firefly Optimization
◽
Firefly Optimization Algorithm
Download Full-text
Higher Order Statics based Primary User Emulation Attack Detection
Indian Journal of Science and Technology
◽
10.17485/ijst/2015/v8i32/88884
◽
2015
◽
Vol 8
(32)
◽
Author(s):
S. Arulselvi
Keyword(s):
Primary User
◽
Higher Order
◽
Attack Detection
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
Joint cooperative spectrum sensing and primary user emulation attack detection in cognitive radio networks using fuzzy conditional entropy maximization
Transactions on Emerging Telecommunications Technologies
◽
10.1002/ett.3567
◽
2019
◽
Vol 30
(5)
◽
pp. e3567
◽
Cited By ~ 3
Author(s):
Avik Banerjee
◽
Santi P. Maity
Keyword(s):
Cognitive Radio
◽
Spectrum Sensing
◽
Cooperative Spectrum Sensing
◽
Conditional Entropy
◽
Primary User
◽
Radio Networks
◽
Attack Detection
◽
Entropy Maximization
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
Analytical study of primary user emulation attack detection techniques in cognitive radio Adhoc network
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
◽
10.1109/uemcon.2017.8249092
◽
2017
◽
Author(s):
J. Gope
◽
P. Dutta
◽
S. Bhadra
◽
S. Bhadra
◽
S. Das
◽
...
Keyword(s):
Cognitive Radio
◽
Analytical Study
◽
Primary User
◽
Attack Detection
◽
Detection Techniques
◽
Primary User Emulation Attack
◽
Primary User Emulation
◽
Adhoc Network
Download Full-text
Ucon-Ipso: Usage Control with Improved Particle Swarm Optimization (Ipso) Based Hierarchical Security Framework for Attack Detection in Wireless Sensor Networks
INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY
◽
10.18535/ijetst/v4i8.40
◽
2017
◽
Vol 4
(8)
◽
Author(s):
N. Thangamani
◽
Keyword(s):
Wireless Sensor Networks
◽
Particle Swarm Optimization
◽
Sensor Networks
◽
Particle Swarm
◽
Attack Detection
◽
Wireless Sensor
◽
Security Framework
◽
Swarm Optimization
◽
Usage Control
◽
Improved Particle Swarm Optimization
Download Full-text
Optimistic Attack Detection Using Triangular Mutation based Particle Swarm Optimization in Wireless Multimedia Sensor Networks
2018 3rd International Conference on Communication and Electronics Systems (ICCES)
◽
10.1109/cesys.2018.8723976
◽
2018
◽
Author(s):
Sandeep Kaur
◽
Tejinder Sharma
Keyword(s):
Particle Swarm Optimization
◽
Sensor Networks
◽
Particle Swarm
◽
Attack Detection
◽
Wireless Multimedia Sensor Networks
◽
Wireless Multimedia
◽
Swarm Optimization
◽
Multimedia Sensor Networks
Download Full-text
SVM based Two Level Authentication for Primary user Emulation Attack Detection
Indian Journal of Science and Technology
◽
10.17485/ijst/2016/v9i29/89270
◽
2016
◽
Vol 9
(29)
◽
Cited By ~ 2
Author(s):
S. Arul Selvi
◽
M. Sundararajan
Keyword(s):
Primary User
◽
Attack Detection
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Security and Privacy in Communication Networks
◽
10.1007/978-3-030-01701-9_17
◽
2018
◽
pp. 297-317
◽
Cited By ~ 1
Author(s):
Qi Dong
◽
Yu Chen
◽
Xiaohua Li
◽
Kai Zeng
◽
Roger Zimmermann
Keyword(s):
Cognitive Radio
◽
Cognitive Radio Networks
◽
Primary User
◽
Radio Networks
◽
Attack Detection
◽
Detection Mechanism
◽
Primary User Emulation Attack
◽
Primary User Emulation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close