{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:32:37Z","timestamp":1730327557956,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3628799","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"228-234","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Packet Timeout Probability for Cognitive Cooperative Radio Network under Security Constraint"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6836-5151","authenticated-orcid":false,"given":"Hung","family":"Tran","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, Phenikaa University, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1865-1816","authenticated-orcid":false,"given":"Tung","family":"Pham Huu","sequence":"additional","affiliation":[{"name":"Hanoi University of Civil Engineering, Vietnam, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5735-4641","authenticated-orcid":false,"given":"Tu","family":"Lam-Thanh","sequence":"additional","affiliation":[{"name":"Ton Duc Thang University, Ho Chi Minh, Vietnam, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-4541-839X","authenticated-orcid":false,"given":"Giang","family":"Vu Le Quynh","sequence":"additional","affiliation":[{"name":"National Academy of Education Management, Hanoi, Vietnam, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5675-8414","authenticated-orcid":false,"given":"Trinh","family":"Van Chien","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technology (SoICT), Hanoi University of Science and Technology, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1180-1199","authenticated-orcid":false,"given":"Viet-Hung","family":"Dang","sequence":"additional","affiliation":[{"name":"Duy Tan University, Da Nang, Vietnam, Viet Nam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0753-5203","authenticated-orcid":false,"given":"Van","family":"Vo Nhan","sequence":"additional","affiliation":[{"name":"Duy Tan University, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"volume-title":"Proc. IEEE International Conference on Communications. Cape Town, South Africa, 1\u20136.","author":"Asghari V.","key":"e_1_3_2_2_1_1","unstructured":"V. Asghari and S. Aissa . 2010. Cooperative Relay Communication Performance under Spectrum-Sharing Resource Requirements . In Proc. IEEE International Conference on Communications. Cape Town, South Africa, 1\u20136. V. Asghari and S. Aissa. 2010. Cooperative Relay Communication Performance under Spectrum-Sharing Resource Requirements. In Proc. IEEE International Conference on Communications. Cape Town, South Africa, 1\u20136."},{"key":"e_1_3_2_2_2_1","volume-title":"Stable Throughput Analysis of Multi-User Cognitive Cooperative Systems. In IEEE Global Telecommunications Conference","author":"Bao Xu","year":"2010","unstructured":"Xu Bao , P. Martins , Tiecheng Song , and Lianfeng Shen . 2010 . Stable Throughput Analysis of Multi-User Cognitive Cooperative Systems. In IEEE Global Telecommunications Conference . Miami, U.S.A., 1\u20135. Xu Bao, P. Martins, Tiecheng Song, and Lianfeng Shen. 2010. Stable Throughput Analysis of Multi-User Cognitive Cooperative Systems. In IEEE Global Telecommunications Conference. Miami, U.S.A., 1\u20135."},{"key":"e_1_3_2_2_3_1","volume-title":"Protocol design and delay analysis of half-duplex buffered cognitive relay systems. 9, 3 (Mar","author":"Chen Yan","year":"2010","unstructured":"Yan Chen , V.K.N. Lau , Shunqing Zhang , and Peiliang Qiu . 2010. Protocol design and delay analysis of half-duplex buffered cognitive relay systems. 9, 3 (Mar . 2010 ), 898\u2013902. Yan Chen, V.K.N. Lau, Shunqing Zhang, and Peiliang Qiu. 2010. Protocol design and delay analysis of half-duplex buffered cognitive relay systems. 9, 3 (Mar. 2010), 898\u2013902."},{"volume-title":"9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","author":"Chetry S.","key":"e_1_3_2_2_4_1","unstructured":"S. Chetry and A. Singh . 2018. \u201cPhysical Layer Security of Outdated CSI Based CRN \". In 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) . Bangalore, India, 1\u20135. S. Chetry and A. Singh. 2018. \u201cPhysical Layer Security of Outdated CSI Based CRN\". In 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Bangalore, India, 1\u20135."},{"key":"e_1_3_2_2_5_1","volume-title":"Asymptotic Analysis of Cooperative Diversity Systems With Relay Selection in a Spectrum-Sharing Scenario. 60, 2 (Feb","author":"Ding Haiyang","year":"2011","unstructured":"Haiyang Ding , Jianhua Ge , D.\u00a0 Benevides da Costa , and Zhuoqin Jiang . 2011. Asymptotic Analysis of Cooperative Diversity Systems With Relay Selection in a Spectrum-Sharing Scenario. 60, 2 (Feb . 2011 ), 457\u2013472. Haiyang Ding, Jianhua Ge, D.\u00a0Benevides da Costa, and Zhuoqin Jiang. 2011. Asymptotic Analysis of Cooperative Diversity Systems With Relay Selection in a Spectrum-Sharing Scenario. 60, 2 (Feb. 2011), 457\u2013472."},{"key":"e_1_3_2_2_6_1","first-page":"8","article-title":"On the Security of Cognitive Radio Networks,\u201d IEEE Transactions on Vehicular Technology","volume":"8","author":"Elkashlan M.","year":"2015","unstructured":"M. Elkashlan , L. Wang , T.\u00a0 Q. Duong , G.\u00a0 K. Karagiannidis , and A. Nallanathan . 2015 . On the Security of Cognitive Radio Networks,\u201d IEEE Transactions on Vehicular Technology . IEEE Transactions on Vehicular Technology 8 , 8 (Aug 2015), 3790\u20133795. M. Elkashlan, L. Wang, T.\u00a0Q. Duong, G.\u00a0K. Karagiannidis, and A. Nallanathan. 2015. On the Security of Cognitive Radio Networks,\u201d IEEE Transactions on Vehicular Technology. IEEE Transactions on Vehicular Technology 8, 8 (Aug 2015), 3790\u20133795.","journal-title":"IEEE Transactions on Vehicular Technology"},{"volume-title":"IEEE International Symposium on Spread Spectrum Techniques and Applications","author":"Gambini J.","key":"e_1_3_2_2_7_1","unstructured":"J. Gambini , O. Simeone , and U. Spagnolini . 2008. Cognitive relaying and opportunistic spectrum sensing in unlicensed multiple access channels . In IEEE International Symposium on Spread Spectrum Techniques and Applications . Bologna, Italy, 371\u2013375. J. Gambini, O. Simeone, and U. Spagnolini. 2008. Cognitive relaying and opportunistic spectrum sensing in unlicensed multiple access channels. In IEEE International Symposium on Spread Spectrum Techniques and Applications. Bologna, Italy, 371\u2013375."},{"key":"e_1_3_2_2_8_1","volume-title":"Cognitive Radio with Secondary Packet-By-Packet Vertical Handover. In IEEE International Conference on Communications","author":"Gambini J.","year":"2008","unstructured":"J. Gambini , O. Simeone , U. Spagnolini , Y. Bar-Ness , and Yungsoo Kim . 2008 . Cognitive Radio with Secondary Packet-By-Packet Vertical Handover. In IEEE International Conference on Communications . Beijing, China, 1050\u20131054. J. Gambini, O. Simeone, U. Spagnolini, Y. Bar-Ness, and Yungsoo Kim. 2008. Cognitive Radio with Secondary Packet-By-Packet Vertical Handover. In IEEE International Conference on Communications. Beijing, China, 1050\u20131054."},{"key":"e_1_3_2_2_9_1","first-page":"5","article-title":"Breaking Spectrum Gridlock With Cognitive Radios","volume":"97","author":"Goldsmith A.","year":"2009","unstructured":"A. Goldsmith , S.A. Jafar , I. Maric , and S. Srinivasa . 2009 . Breaking Spectrum Gridlock With Cognitive Radios : An Information Theoretic Perspective. 97 , 5 (May 2009), 894\u2013914. A. Goldsmith, S.A. Jafar, I. Maric, and S. Srinivasa. 2009. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective. 97, 5 (May 2009), 894\u2013914.","journal-title":"An Information Theoretic Perspective."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Y. Han S. Ting and A. Pandharipande. 2011. Cooperative Spectrum Sharing Protocol with Selective Relaying System. 60 1 (Jan. 2011) 62\u201367. Y. Han S. Ting and A. Pandharipande. 2011. Cooperative Spectrum Sharing Protocol with Selective Relaying System. 60 1 (Jan. 2011) 62\u201367.","DOI":"10.1109\/TCOMM.2011.100411.100469"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Yang Han See\u00a0Ho Ting and A. Pandharipande. 2010. Cooperative Spectrum Sharing Protocol with Secondary User Selection. 9 9 (Sep. 2010) 2914\u20132923. Yang Han See\u00a0Ho Ting and A. Pandharipande. 2010. Cooperative Spectrum Sharing Protocol with Secondary User Selection. 9 9 (Sep. 2010) 2914\u20132923.","DOI":"10.1109\/TWC.2010.080210.091741"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2323338"},{"volume-title":"IEEE International Symposium on Personal Indoor and Mobile Radio Communications","author":"Khabazian M.","key":"e_1_3_2_2_13_1","unstructured":"M. Khabazian and S. Aissa . 2011. Modeling and performance analysis of cooperative communications in cognitive radio networks . In IEEE International Symposium on Personal Indoor and Mobile Radio Communications . Toronto, Canada, 598\u2013603. M. Khabazian and S. Aissa. 2011. Modeling and performance analysis of cooperative communications in cognitive radio networks. In IEEE International Symposium on Personal Indoor and Mobile Radio Communications. Toronto, Canada, 598\u2013603."},{"key":"e_1_3_2_2_14_1","volume-title":"Protocol design and throughput analysis for multi-user cognitive cooperative systems. 8, 9 (Sep","author":"Krikidis I.","year":"2009","unstructured":"I. Krikidis , J.N. Laneman , J.S. Thompson , and S. McLaughlin . 2009. Protocol design and throughput analysis for multi-user cognitive cooperative systems. 8, 9 (Sep . 2009 ), 4740\u20134751. I. Krikidis, J.N. Laneman, J.S. Thompson, and S. McLaughlin. 2009. Protocol design and throughput analysis for multi-user cognitive cooperative systems. 8, 9 (Sep. 2009), 4740\u20134751."},{"key":"e_1_3_2_2_15_1","volume-title":"Outage Probability of Cognitive Relay Networks with Interference Constraints. 10, 2 (Feb","author":"Lee Jemin","year":"2011","unstructured":"Jemin Lee , Hano Wang , J.G. Andrews , and Daesik Hong . 2011. Outage Probability of Cognitive Relay Networks with Interference Constraints. 10, 2 (Feb . 2011 ), 390\u2013395. Jemin Lee, Hano Wang, J.G. Andrews, and Daesik Hong. 2011. Outage Probability of Cognitive Relay Networks with Interference Constraints. 10, 2 (Feb. 2011), 390\u2013395."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2574315"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"A.K. Sadek K.J.R. Liu and A. Ephremides. 2007. Cognitive multiple access via cooperation: Protocol design and performance analysis. 53 10 (Oct. 2007) 3677\u20133696. A.K. Sadek K.J.R. Liu and A. Ephremides. 2007. Cognitive multiple access via cooperation: Protocol design and performance analysis. 53 10 (Oct. 2007) 3677\u20133696.","DOI":"10.1109\/TIT.2007.904784"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"S. Sagong J. Lee and D. Hong. 2011. Capacity of Reactive DF Scheme in Cognitive Relay Networks. 10 10 (Oct. 2011) 3133\u20133138. S. Sagong J. Lee and D. Hong. 2011. Capacity of Reactive DF Scheme in Cognitive Relay Networks. 10 10 (Oct. 2011) 3133\u20133138.","DOI":"10.1109\/TWC.2011.081011.101849"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"O. Simeone Y. Bar-Ness and U. Spagnolini. 2007. Stable Throughput of Cognitive Radios With and Without Relaying Capability. 55 12 (Dec. 2007) 2351\u20132360. O. Simeone Y. Bar-Ness and U. Spagnolini. 2007. Stable Throughput of Cognitive Radios With and Without Relaying Capability. 55 12 (Dec. 2007) 2351\u20132360.","DOI":"10.1109\/TCOMM.2007.910699"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2722014"},{"volume-title":"Proc. IEEE International Conference on Communications","author":"Suraweera H.A.","key":"e_1_3_2_2_22_1","unstructured":"H.A. Suraweera , P.J. Smith , and N.A. Surobhi . 2008. Exact outage probability of cooperative diversity with opportunistic spectrum access . In Proc. IEEE International Conference on Communications . Beijing, China, 79\u201384. H.A. Suraweera, P.J. Smith, and N.A. Surobhi. 2008. Exact outage probability of cooperative diversity with opportunistic spectrum access. In Proc. IEEE International Conference on Communications. Beijing, China, 79\u201384."},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. IEEE Global Telecommunications Conference","author":"Tran Hung","year":"2011","unstructured":"Hung Tran , Trung\u00a0 Q. Duong , and Hans-J\u00fcrgen Zepernick . 2011 . Performance Analysis of Cognitive Relay Networks Under Power Constraints of Multiple Primary Users . In Proc. IEEE Global Telecommunications Conference . Houston, U.S.A., 1\u20136. Hung Tran, Trung\u00a0Q. Duong, and Hans-J\u00fcrgen Zepernick. 2011. Performance Analysis of Cognitive Relay Networks Under Power Constraints of Multiple Primary Users. In Proc. IEEE Global Telecommunications Conference. Houston, U.S.A., 1\u20136."},{"volume-title":"Proc. IEEE International Conference on Communication Software and Networks (ICCSN)","author":"Zhao H.","key":"e_1_3_2_2_24_1","unstructured":"H. Zhao , H. Liu , Y. Liu , C. Tang , and G. Pan . 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels . In Proc. IEEE International Conference on Communication Software and Networks (ICCSN) . Chengdu, China, 201\u2013205. H. Zhao, H. Liu, Y. Liu, C. Tang, and G. Pan. 2015. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels. In Proc. IEEE International Conference on Communication Software and Networks (ICCSN). Chengdu, China, 201\u2013205."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2529704"},{"key":"e_1_3_2_2_26_1","volume-title":"Outage Analysis of Decode-and-Forward Cognitive Dual-Hop Systems With the Interference Constraint in Nakagami-m Fading Channels. 60, 6 (Jul","author":"Zhong Caijun","year":"2011","unstructured":"Caijun Zhong , T. Ratnarajah , and Kai-Kit Wong . 2011. Outage Analysis of Decode-and-Forward Cognitive Dual-Hop Systems With the Interference Constraint in Nakagami-m Fading Channels. 60, 6 (Jul . 2011 ), 2875\u20132879. Caijun Zhong, T. Ratnarajah, and Kai-Kit Wong. 2011. Outage Analysis of Decode-and-Forward Cognitive Dual-Hop Systems With the Interference Constraint in Nakagami-m Fading Channels. 60, 6 (Jul. 2011), 2875\u20132879."}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","acronym":"SOICT 2023","location":"Ho Chi Minh Vietnam"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3628799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T18:18:30Z","timestamp":1703096310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":26,"alternative-id":["10.1145\/3628797.3628799","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3628799","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}