The following publications are possibly variants of this publication:
- Securing cognitive radio networks against primary user emulation attacksRong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani. network, 29(4):68-74, 2015. [doi]
- Toward efficient radio spectrum utilization: user cooperation in cognitive radio networkingBin Cao, Qinyu Zhang, Jon W. Mark, Lin X. Cai, H. Vincent Poor. network, 26(4):46-52, 2012. [doi]
- Secondary user friendly TDMA scheduling for primary users in cognitive radio networksHang Su, Xi Zhang. ciss 2009: 593-599 [doi]
- Secondary User Friendly TDMA Scheduling for Primary Users in Cognitive Radio NetworksHang Su, Xi Zhang. globecom 2009: 1-6 [doi]