E. Axell, G. Leus, E. Larsson, and H. Poor, Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances, IEEE Signal Processing Magazine, vol.29, issue.3, pp.101-116, 2012.
DOI : 10.1109/MSP.2012.2183771

R. Chen, J. Park, Y. Hou, and J. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Communications Magazine, vol.46, issue.4, pp.50-55, 2008.
DOI : 10.1109/MCOM.2008.4481340

N. Nguyen-thanh and I. Koo, A Robust Secure Cooperative Spectrum Sensing Scheme Based on Evidence Theory and Robust Statistics in Cognitive Radio, IEICE Transactions on Communications, vol.92, issue.12, pp.3644-3652, 2009.
DOI : 10.1587/transcom.E92.B.3644

K. Zeng, P. Paweczak, and D. Cabric, Reputation-based cooperative spectrum sensing with trusted nodes assistance, IEEE Communications Letters, vol.14, issue.3, pp.226-228, 2010.
DOI : 10.1109/LCOMM.2010.03.092240

F. Penna, Y. Sun, L. Dolecek, and D. Cabric, Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing, IEEE Transactions on Signal Processing, vol.60, issue.4, pp.1806-1822, 2012.
DOI : 10.1109/TSP.2011.2181839

H. Tang, F. Yu, M. Huang, and Z. Li, Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks, IET Communications, vol.6, issue.8, pp.974-983, 2012.
DOI : 10.1049/iet-com.2010.0553

R. Chen, J. M. Park, and K. Bian, Robust Distributed Spectrum Sensing in Cognitive Radio Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.251

P. Kaligineedi, M. Khabbazian, and V. Bhargava, Secure Cooperative Sensing Techniques for Cognitive Radio Systems, 2008 IEEE International Conference on Communications, pp.3406-3410, 2008.
DOI : 10.1109/ICC.2008.640

R. Chen, J. M. Park, and J. Reed, Defense against Primary User Emulation Attacks in Cognitive Radio Networks, Selected Areas in Communications, pp.25-37, 2008.
DOI : 10.1109/JSAC.2008.080104

URL : http://www.arias.ece.vt.edu/publications/conferences/LocDef.pdf

S. Chen, K. Zeng, and P. Mohapatra, Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space, IEEE Transactions on Mobile Computing, vol.12, issue.3, pp.401-411, 2013.
DOI : 10.1109/TMC.2011.272

H. Li and Z. Han, Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics, IEEE Transactions on Wireless Communications, vol.9, issue.11, pp.3566-3577, 2010.
DOI : 10.1109/TWC.2010.091510.100629

Q. Peng, P. Cosman, and L. Milstein, Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary, Selected Areas in Communications, pp.903-911, 2011.

Y. Tan, S. Sengupta, and K. Subbalakshmi, Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach, IET Communications, vol.6, issue.8, pp.964-973, 2012.
DOI : 10.1049/iet-com.2010.0573

N. Nguyen-thanh, P. Ciblat, A. T. Pham, and V. T. Nguyen, Attack and surveillance strategies for selfish primary user emulator in cognitive radio network, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2014.
DOI : 10.1109/GlobalSIP.2014.7032312

Y. Shoham and K. Leyton-brown, Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations, 2008.
DOI : 10.1017/CBO9780511811654

B. Wang, Y. Wu, and K. R. Liu, Game theory for cognitive radio networks: An overview, Computer Networks, vol.54, issue.14, pp.2537-2561, 2010.
DOI : 10.1016/j.comnet.2010.04.004

M. Felegyhazi and J. Hubaux, Game Theory in Wireless Networks: A Tutorial, Computing Surveys, 2006.

G. B. Dantzig and M. N. Thapa, Linear Programming 1: 1: Introduction, 1997.

C. Lemke, J. Howson, and . Jr, Equilibrium Points of Bimatrix Games, Journal of the Society for Industrial and Applied Mathematics, vol.12, issue.2, pp.413-423, 1964.
DOI : 10.1137/0112033