“Securing Cognitive Radio Networks against Primary User Emulation Attacks” has been added to your cart. Continue shopping “SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver ₹4,500 Theoretical Analysis of the Co-Existence of LTE-A Signals and Design of an ML-SIC Receiver quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹9,000 × Collaboratively Tracking Interests for User Clustering in Streams of Short Texts ₹4,500 Collaboratively Tracking Interests for User Clustering in Streams of Short Texts quantity ₹4,500 × Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks ₹4,500 Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹36,000 Total ₹36,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout