@dblp

Spectrum scanning when the intruder might have knowledge about the scanner's capabilities.

, , , and . ICASSP, page 1742-1746. IEEE, (2015)

Links and resources

Tags