What are the Roles of Electronic and Cyber Warfare in Cognitive Radio Security?

被引:0
|
作者
Scott, Amber [1 ]
Hardy, T. J. [1 ]
Martin, Richard K. [1 ]
Thomas, Ryan W. [1 ]
机构
[1] USAF, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, Electronic Warfare (EW) and Cyber Warfare (CW) have been viewed as independent, disparate disciplines. However, they are often trying to accomplish similar tasks, and thus may be viewed as two sides of the same coin. When both the attacher and defender employ cognitive techniques, the edge may go to the side that integrates techniques from both EW and CWo In this paper, we examine two case studies in radio security. We examine what happens when the attacker is cognitive, and consider cognitive EW/CW approaches to defend against the attacks.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Study on Security in Cognitive Radio Networks
    Wang Weifang
    [J]. 2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 366 - 369
  • [42] Security in Cognitive Radio Networks - A Survey
    Sumathi, A. C.
    Vidhyapriya, R.
    [J]. 2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2012, : 114 - 118
  • [43] A Survey on Security in Cognitive Radio Networks
    Khasawneh, Mahmoud
    Agarwal, Anjali
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
  • [44] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [45] CYBER WARFARE THREAT PREVENTION: THE NEXT MAJOR CHALLENGE FOR INTERNET SECURITY RESEARCH
    Li, Bo
    Wilkinson, Graeme
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 611 - 613
  • [46] Cyber-security must become a feature a network-centric warfare
    Tether, AJ
    [J]. AVIATION WEEK & SPACE TECHNOLOGY, 2003, 158 (26): : 74 - 74
  • [47] Electronic Warfare systems supporting the database of the Radio Environment Maps
    Suchanski, Marek
    Kaniewski, Pawel
    Romanik, Janusz
    Golan, Edward
    Zubel, Krzysztof
    [J]. XII CONFERENCE ON RECONNAISSANCE AND ELECTRONIC WARFARE SYSTEMS, 2019, 11055
  • [48] Cyber Security for a Smart Grid - What About Phishing?
    Holm, Hannes
    Flores, Waldo Rocha
    Ericsson, Goran
    [J]. 2013 4TH IEEE/PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2013,
  • [49] Cyber Security at Home - What Really Matters to People
    Pospisil, Bettina
    Sauter, Thilo
    Treytl, Albert
    Huber, Edith
    Sebock, Walter
    [J]. 2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 1208 - 1213
  • [50] What's so Unique about Cyber Security?
    Doyle, Kenny
    Dooly, Zeta
    Kearney, Paul
    [J]. CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 131 - 139