1.
A Survey of Various Defense Techniques to Detect Primary User Emulation Attacks. Int. J. Curr. Eng. Technol. [Internet]. 2014 Apr. 30 [cited 2026 Apr. 8];4(2):900-8. Available from: https://ijcet.evegenis.org/index.php/ijcet/article/view/637