2022
DOI: 10.1007/s11276-022-03055-0
|View full text |Cite
|
Sign up to set email alerts
|

Support vector machine approach of malicious user identification in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…In [11], a support vector machine (SVM) learning technique is mainly developed to learn performance of malicious consumers and it categorizes genuine as well as mischievous users. A particle swarm optimization (PSO) model too combined to absorb minimum probable differences malicious consumer's energy report deviance from genuine SUs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [11], a support vector machine (SVM) learning technique is mainly developed to learn performance of malicious consumers and it categorizes genuine as well as mischievous users. A particle swarm optimization (PSO) model too combined to absorb minimum probable differences malicious consumer's energy report deviance from genuine SUs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In reference 20, an ant colony optimization and differential evolution model was used to secure CSS against attack in CRNs. A support vector machine was used to learn the malicious behavior and identify malicious users in references 21,22. Based on a reinforcement learning algorithm, an adaptive trust threshold model was proposed to deal with ordinary and intelligent SSDF attack in reference 23.…”
Section: Introductionmentioning
confidence: 99%