Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In th
As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. Ho
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searchi
In cognitive radio(CR), there is a tradeoff between spectrum sensing time and throughput of secondary user(SU). In the conventional sensing-throughput tradeoff