has been cited by the following article(s): 
        
    
    
        
        
            
             
                
                         
                                | [1] | Possible adoption of various machine learning techniques in cognitive radio-a survey | 
 
                            
                            |  | 2021 | 
                        
                                |  |  | 
                    
                         
                                | [2] | Slow Scan Attack Detection Based on Communication Behavior | 
 
                            
                            |  | 2020 | 
                        
                                |  |  | 
                    
                         
                                | [3] | Secure Distributed Spectrum Sensing in Cognitive Radio Networks | 
 
                            
                            |  | 2019 | 
                        
                                |  |  | 
                    
                         
                                | [4] | Hybrid accuracy-time trade-off solution for spectrum sensing in cognitive radio networks | 
 
                            
                            |  | 2019 | 
                        
                                |  |  | 
                    
                         
                                | [5] | Special issue on security for emerging open networking technologies | 
 
                            
                            |  | 2018 | 
                        
                                |  |  | 
                    
                         
                                | [6] | Survey on Fuzzy Logic Enabled Cognitive Radios | 
 
                            
                            |  | Emerging Technologies in Computing,
                                
                                    2018 | 
                        
                                |  |  | 
                    
                         
                                | [7] | Malicious user detection in infra-structre based Cognitive radio networs (CRNs) | 
 
                            
                            |  | 2018 | 
                        
                                |  |  | 
                    
                         
                                | [8] | Improved Energy Detector for Spectrum Sensing Using Neuro-Fuzzy Double Threshold Technique | 
 
                            
                            |  | Studies in Informatics and …,
                                
                                    2017 | 
                        
                                |  |  | 
                    
                         
                                | [9] | An antenna selection scheme with MRE and AWC for decision fusion in cognitive radio | 
 
                            
                            |  | Transactions on Emerging Telecommunications Technologies,
                                
                                    2017 | 
                        
                                |  |  | 
                    
                         
                                | [10] | A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks | 
 
                            
                            |  | Wireless Personal Communications,
                                
                                    2017 | 
                        
                                |  |  | 
                    
                         
                                | [11] | Trust management in cognitive radio networks: A survey | 
 
                            
                            |  | International Journal of Network Management,
                                
                                    2017 | 
                        
                                |  |  | 
                    
                         
                                | [12] | CERTAIN INVESTIGATIONS ON SPECTRUM SENSING FRAMEWORK AND ATTACK DETECTION IN COGNITIVE RADIO NETWORKS | 
 
                            
                            |  | 2016 | 
                        
                                |  |  | 
                    
                         
                                | [13] | Security challenges in cognitive radio network and defending against Byzantine attack: a survey | 
 
                            
                            |  | International Journal of Communication Networks and Distributed Systems,
                                
                                    2016 | 
                        
                                |  |  | 
                    
                         
                                | [14] | Function approximation based energy detection in cognitive radio using radial basis function network | 
 
                            
                            |  | Journal of Clinical and Experimental Neuropsychology,
                                
                                    2016 | 
                        
                                |  |  | 
                    
                         
                                | [15] | Fusion Rule for Cooperative Spectrum Sensing in Cognitive Radio | 
 
                            
                            |  | Circuits, Systems, and Signal Processing,
                                
                                    2015 | 
                        
                                |  |  | 
                    
                         
                                | [16] | Fortification of malicious onslaughts using enhanced fusion centre | 
 
                            
                            |  | Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on,
                                
                                    2014 | 
                        
                                |  |  | 
                    
                         
                                | [17] | Fuzzy based Implementation Resource Allocation in Cognitive Radio Networks for Secondary Users | 
 
                            
                            |  | Wireless Communication,
                                
                                    2013 | 
                        
                                |  |  | 
                    
                         
                                | [18] | Cellular Automata Approach for a Low Power Fusion Center to Evaluate Spectrum Status and Coverage Area in Cognitive Radios | 
 
                            
                            |  | Journal of Low Power  …,
                                
                                    2013 | 
                        
                                |  |  | 
                    
                
                
             
            
                
                    
                            
                                | [1] | Slow Scan Attack Detection Based on Communication Behavior 2020 the 10th International Conference on Communication and Network Security,      
                                    2020
 DOI:10.1145/3442520.3442525
 | 
                            
                                |  |  | 
                        
                            
                                | [2] | Slow Scan Attack Detection Based on Communication Behavior 2020 the 10th International Conference on Communication and Network Security,      
                                    2020
 DOI:10.1145/3442520.3442525
 | 
                            
                                |  |  | 
                        
                            
                                | [3] | A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks Wireless Personal Communications,      
                                    2017
 DOI:10.1007/s11277-017-4621-5
 | 
                            
                                |  |  | 
                        
                            
                                | [4] | Fortification of malicious onslaughts using enhanced fusion centre 2014 IEEE International Conference on Computational Intelligence and Computing Research,      
                                    2014
 DOI:10.1109/ICCIC.2014.7238565
 | 
                            
                                |  |  |