Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances, IEEE Signal Processing Magazine, vol.29, issue.3, pp.101-116, 2012. ,
DOI : 10.1109/MSP.2012.2183771
Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Communications Magazine, vol.46, issue.4, pp.50-55, 2008. ,
DOI : 10.1109/MCOM.2008.4481340
A Robust Secure Cooperative Spectrum Sensing Scheme Based on Evidence Theory and Robust Statistics in Cognitive Radio, IEICE Transactions on Communications, vol.92, issue.12, pp.3644-3652, 2009. ,
DOI : 10.1587/transcom.E92.B.3644
Reputation-based cooperative spectrum sensing with trusted nodes assistance, IEEE Communications Letters, vol.14, issue.3, pp.226-228, 2010. ,
DOI : 10.1109/LCOMM.2010.03.092240
Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing, IEEE Transactions on Signal Processing, vol.60, issue.4, pp.1806-1822, 2012. ,
DOI : 10.1109/TSP.2011.2181839
Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks, IET Communications, vol.6, issue.8, pp.974-983, 2012. ,
DOI : 10.1049/iet-com.2010.0553
Robust Distributed Spectrum Sensing in Cognitive Radio Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.251
Secure Cooperative Sensing Techniques for Cognitive Radio Systems, 2008 IEEE International Conference on Communications, pp.3406-3410, 2008. ,
DOI : 10.1109/ICC.2008.640
Defense against Primary User Emulation Attacks in Cognitive Radio Networks, Selected Areas in Communications, pp.25-37, 2008. ,
DOI : 10.1109/JSAC.2008.080104
URL : http://www.arias.ece.vt.edu/publications/conferences/LocDef.pdf
Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space, IEEE Transactions on Mobile Computing, vol.12, issue.3, pp.401-411, 2013. ,
DOI : 10.1109/TMC.2011.272
Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics, IEEE Transactions on Wireless Communications, vol.9, issue.11, pp.3566-3577, 2010. ,
DOI : 10.1109/TWC.2010.091510.100629
Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary, Selected Areas in Communications, pp.903-911, 2011. ,
Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach, IET Communications, vol.6, issue.8, pp.964-973, 2012. ,
DOI : 10.1049/iet-com.2010.0573
Attack and surveillance strategies for selfish primary user emulator in cognitive radio network, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2014. ,
DOI : 10.1109/GlobalSIP.2014.7032312
Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations, 2008. ,
DOI : 10.1017/CBO9780511811654
Game theory for cognitive radio networks: An overview, Computer Networks, vol.54, issue.14, pp.2537-2561, 2010. ,
DOI : 10.1016/j.comnet.2010.04.004
Game Theory in Wireless Networks: A Tutorial, Computing Surveys, 2006. ,
Linear Programming 1: 1: Introduction, 1997. ,
Equilibrium Points of Bimatrix Games, Journal of the Society for Industrial and Applied Mathematics, vol.12, issue.2, pp.413-423, 1964. ,
DOI : 10.1137/0112033