“A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks” (2014) International Journal of Current Engineering and Technology, 4(2), pp. 900–908. Available at: https://ijcet.evegenis.org/index.php/ijcet/article/view/637 (Accessed: 11 April 2026).