共 77 条
[1]
Abrardo A(2016)A game-theoretic framework for optimum decision fusion in the presence of by zantines IEEE Trans. Inf. Forensics Secur. 11 1333-1345
[2]
Barni M(2019)An energy persistent range-dependent regulated transmission communication model for vehicular network applications Comput. Netw. 152 144-153
[3]
Kallas K(2015)Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation IEEE Trans. Inf. Forensics Secur. 10 2225-2235
[4]
Tondi B(2008)Toward secure distributed spectrum sensing in cognitive radio networks IEEE Commun. Mag. 46 50-55
[5]
Baskar S(2017)Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack IET Commun. 11 2370-2379
[6]
Periyanayagi S(2018)Protecting operation-time privacy of primary users in downlink cognitive two-tier networks IEEE Trans. Veh. Technol. 67 6561-6572
[7]
Shakeel PM(2017)Spectrum sensing defending against PUE attack based on fractal dimension Cluster Computing 22 2667-2675
[8]
Dhulipala VS(2017)Defence against primary user emulation attack using statistical properties of the cognitive radio received power IET Commun. 11 1535-1542
[9]
Borle KM(2017)On detecting primary user emulation attack using channel impulse response in the cognitive radio network Front. Inf. Technol. Electron. Eng. 18 1665-1676
[10]
Chen B(2018)Efficient transmission strategy for cognitive radio systems under primary user emulation attack IEEE Syst. J. 12 3767-3774