1.
A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks. Int. J. Curr. Eng. Technol. 2014;4(2):900-908. Accessed April 7, 2026. https://ijcet.evegenis.org/index.php/ijcet/article/view/637