@incollection{, D5E52B3AFA6B2CEB0DE8DA26C2CD12C9 , author={{GSunilkumar} and {University Visvesvaraya College of Engineering, Bangalore University, Bangalore .}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1422944 } @book{b0, , title={{Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio}} , author={{ IiiMitola }} , year={2000} , address={Sweden} Royal Institute of Technology , note={PhD thesis} } @book{b1, , title={{Cognitive Networks: Foundation to Applications}} , author={{ D HFriend }} , year={March 6, 2009} , address={Blacksburg} Electrical and Computer Engineering, Virginia Polytechnic and State Univ. , note={Ph.D. Dissertation} } @incollection{b2, , title={{Cognitive networks}} , author={{ R WThomas } and { L ADasilva } and { A BMackenzie }} , booktitle={{Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks}} the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access NetworksBaltimore, USA , year={November 8-11, 2005} } @book{b3, , title={{Cognitive Networks: Towards Self-Aware Networks}} , author={{ QusayMahmoud }} , year={2007} , publisher={Wiley Inter science} } @incollection{b4, , title={{Nonlinear Systems Identification and Control via Dynamic Multi time Scales Neural Networks}} , author={{ XuanHan } and { WenFangXie } and { ZhijunFu } and { WeidongLuo }} , booktitle={{IEEE Transactions Neural Networks and Learning Systems}} , year={2013} } @incollection{b5, , title={{Nonlinear systems identification using dynamic multi-time scale neural networks}} , author={{ XuanHan } and { WenFangXie } and { ZhijunFu } and { WeidongLuo }} , booktitle={{Proce-e dings of the Neuro computation, October17}} e-e dings of the Neuro computation, October17 , year={2011} } @incollection{b6, , title={{The price of ignorance: distributed topology control in cognitive networks}} , author={{ R SKomali } and { R WThomas } and { L ADasilva } and { AMackenzie }} , journal={{IEEE Transactions on Wireless Communications}} 9 4 , year={April 2010} } @incollection{b7, , title={{A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks}} , author={{ DaojingHe } and { ChunChen } and { SChan } and { JiajunBu } and { AVasilakos }} , journal={{IEEE Transactions on Information Technology in Biomedicine}} 16 6 , year={Nov. 2012} } @incollection{b8, , title={{IDSV: Intrusion Detection Algorithm Based on Statistics Variance Method in User Transmission Behavior}} , author={{ TaoJun } and { LinHui } and { LiuChunlin }} , booktitle={{Proceedings of International Conference on Computational and Sciences}} International Conference on Computational and Sciences , year={Dec.17-19, 2010} } @incollection{b9, , title={{Anomaly detection in IP networks}} , author={{ MThottan } and { ChuanyiJi }} , journal={{IEEE Transactions on Signal Processing}} 51 8 , year={Aug. 2003} } @incollection{b10, , title={{Wireless Information Security Based on Cognitive Approaches}} , author={{ StephenS C Lingareddy } and { Charles } and { KashyapVinayababu } and { Dhruve }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 9 12 , year={2009} } @incollection{b11, , title={{Optimal max-min lifetime routing of multicasts in ad-hoc networks with directional antennas}} , author={{ KerryWood } and { ALuiz } and { Dasilva }} , booktitle={{Proceedings of International Conference on Broadband Networks (BROADNETS 05)}} International Conference on Broadband Networks (BROADNETS 05) , year={October 2005} } @book{b12, , author={{ MKubale }} , title={{Contemporary Mathematics}} Providence, Rhode Island , publisher={American Mathematical Society} , year={2004} , note={Graph Colorings} } @incollection{b13, , title={{Effect of selfish node behavior on efficient topology design}} , author={{ A BR S Komali } and { R PMackenzie } and { Gilles }} , journal={{IEEE Transactions on Mobile Computing}} 7 9 , year={2008} } @incollection{b14, , title={{A secure mobile healthcare system using trust based multicast scheme}} , author={{ ABoukerche } and { YRen }} , journal={{IEEE Journal on Selected Areas of Communications}} 27 4 , year={May 2009} } @incollection{b15, , title={{An Ethernet address resolution protocol or converting network protocol addresses to 48 bit Ethernet address for transmission on Ethernet hardware}} , author={{ CDavid } and { Plummer }} , journal={{Internet Request For Comments RFC}} 826 , year={November 1982} } @incollection{b16, , title={{Research on weighted multi-random decision tree and its application to intrusion detection}} , author={{ YeZhao Xiao Feng } and { Zhen }} , journal={{Journal of Computer Engineering and Applications}} Hefei University of Technology } @incollection{b17, , title={{Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection}} , author={{ JSalvatore } and { WeiStolfo } and { WenkeFan } and { AndreasLee } and { PhilipKProdromidis } and { Chan }} , booktitle={{Proceedings of IEEE Symposium on Security and Privacy}} IEEE Symposium on Security and PrivacyOakland, CA , year={May 1999} } @incollection{b18, , title={{Approach for local multidomain cognition in cognitive network}} , author={{ ZhangWenzhu } and { YiBohai }} , journal={{IEEE Transactions on Communications}} 10 1 , year={January 2013} } @book{b19, , title={{Applied Regression Analysis and Other Multivariable Methods}} , author={{ D GKlein } and { L LKupper } and { ANizam }} , year={2008} , publisher={Thomson Press} , address={Belmont, USA} , note={Fourth Edition} } @incollection{b20, , title={{System Info of Multi-Domain Cognition in Cognitive Radio Networks}} , author={{ DingGuoru } and { WangJinlong } and { WuQihui }} , booktitle={{Proceedings of IEEE International Conference on Wireless Communications and Signal Processing}} IEEE International Conference on Wireless Communications and Signal ProcessingChina , year={October 21-23, 2010} } @incollection{b21, , title={{Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks}} , author={{ GSunilkumar } and { JThriveni } and { K RVenugopal } and { L MPatnaik }} , journal={{International Journal of Computer Science Issues}} 9 3 , year={March 2012} } @book{b22, , title={{Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory}} , author={{ MMadan } and { LiangGupta } and { NoriyasuJin } and { Homma }} , year={April 5, 2004} , publisher={John Wiley & Sons} }