“Securing Cognitive Radio Networks against Primary User Emulation Attacks” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver ₹4,500 Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹9,000 × Collaboratively Tracking Interests for User Clustering in Streams of Short Texts ₹4,500 Collaboratively Tracking Interests for User Clustering in Streams of Short Texts quantity ₹4,500 × Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks ₹4,500 Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹31,500 Total ₹31,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout