共 50 条
- [41] Study on Security in Cognitive Radio Networks [J]. 2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 366 - 369
- [42] Security in Cognitive Radio Networks - A Survey [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 114 - 118
- [43] A Survey on Security in Cognitive Radio Networks [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
- [44] Security Threats in Cognitive Radio Networks [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
- [45] CYBER WARFARE THREAT PREVENTION: THE NEXT MAJOR CHALLENGE FOR INTERNET SECURITY RESEARCH [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 611 - 613
- [46] Cyber-security must become a feature a network-centric warfare [J]. AVIATION WEEK & SPACE TECHNOLOGY, 2003, 158 (26): : 74 - 74
- [47] Electronic Warfare systems supporting the database of the Radio Environment Maps [J]. XII CONFERENCE ON RECONNAISSANCE AND ELECTRONIC WARFARE SYSTEMS, 2019, 11055
- [48] Cyber Security for a Smart Grid - What About Phishing? [J]. 2013 4TH IEEE/PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2013,
- [49] Cyber Security at Home - What Really Matters to People [J]. 2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 1208 - 1213
- [50] What's so Unique about Cyber Security? [J]. CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 131 - 139