“A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks”. International Journal of Current Engineering and Technology, vol. 4, no. 2, Apr. 2014, pp. 900-8, https://ijcet.evegenis.org/index.php/ijcet/article/view/637.