[1]
2014. A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks. International Journal of Current Engineering and Technology. 4, 2 (Apr. 2014), 900–908.