2018
DOI: 10.1109/tmc.2018.2823314
|View full text |Cite
|
Sign up to set email alerts
|

SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…Misuse intrusion detection [15,16] detects intrusion events by matching the defined intrusion pattern with the observed intrusion behavior, which can be divided into contingent probability-based misuse intrusion detection, state transition analysis-based misuse intrusion detection, and keyboard monitoring-based misuse intrusion detection. e contingent probability-based misuse intrusion detection maps the intrusion to an event sequence and then infers the intrusion occurrence by observing the event [17,18]. However, in this method, the prior probability is hard to give, and the event independences are hard to be satisfied.…”
Section: Related Workmentioning
confidence: 99%
“…Misuse intrusion detection [15,16] detects intrusion events by matching the defined intrusion pattern with the observed intrusion behavior, which can be divided into contingent probability-based misuse intrusion detection, state transition analysis-based misuse intrusion detection, and keyboard monitoring-based misuse intrusion detection. e contingent probability-based misuse intrusion detection maps the intrusion to an event sequence and then infers the intrusion occurrence by observing the event [17,18]. However, in this method, the prior probability is hard to give, and the event independences are hard to be satisfied.…”
Section: Related Workmentioning
confidence: 99%
“…Learning-based radios are envisioned to be able to automatically infer the current spectrum status in terms of occupancy [27], interference [28] and malicious activities [29]. Most of the existing work is based on low-dimensional machine learning [18][19][20]30], which requires the cumbersome manual extraction of very complex, ad hoc features from the waveforms.…”
Section: Related Workmentioning
confidence: 99%
“…For CRN security, [35] propose authentication of CR device with signal at the physical layer and [36] propose detecting and preventing malicious CR at device level. Although authentication can verify the identity of a CR device and device level security protects a CR device from being compromised, they cannot ensure authority that every connected CR device is benign and complies to transmission permissions at runtime in our case.…”
Section: Related Workmentioning
confidence: 99%