Return to Issue Details A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks Download Download PDF