{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T06:49:35Z","timestamp":1720680575911},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100007846","name":"National Telecommunication Regulatory Authority","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007846","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Physical Communication"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.phycom.2020.101260","type":"journal-article","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T11:47:00Z","timestamp":1609156020000},"page":"101260","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Securing hybrid channel access cognitive radio networks with energy harvesting"],"prefix":"10.1016","volume":"45","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9798-5931","authenticated-orcid":false,"given":"Ahmed F.","family":"Tayel","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7906-815X","authenticated-orcid":false,"given":"Ahmed H. Abd","family":"El-Malek","sequence":"additional","affiliation":[]},{"given":"Sherif I.","family":"Rabia","sequence":"additional","affiliation":[]},{"given":"Amr M.","family":"Abdelrazek","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.phycom.2020.101260_b1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2008.4481339","article-title":"A survey on spectrum management in cognitive radio networks","volume":"46","author":"Akyildiz","year":"2008","journal-title":"IEEE Commun. Mag."},{"issue":"9","key":"10.1016\/j.phycom.2020.101260_b2","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/TMC.2011.155","article-title":"Modeling and analysis for spectrum handoffs in cognitive radio networks","volume":"11","author":"Wang","year":"2012","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"10","key":"10.1016\/j.phycom.2020.101260_b3","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/JSAC.2012.121116","article-title":"Analysis of reactive spectrum handoff in cognitive radio networks","volume":"30","author":"Wang","year":"2012","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"11","key":"10.1016\/j.phycom.2020.101260_b4","doi-asserted-by":"crossref","first-page":"4487","DOI":"10.1109\/TCOMM.2016.2607741","article-title":"An optimized hybrid approach for spectrum handoff in cognitive radio networks with non-identical channels","volume":"64","author":"Tayel","year":"2016","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/j.phycom.2020.101260_b5","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TCCN.2017.2780840","article-title":"A new probabilistic target channel selection approach for load balancing in cognitive radio networks","volume":"4","author":"Tayel","year":"2018","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b6","doi-asserted-by":"crossref","first-page":"5306","DOI":"10.1109\/T-WC.2008.070890","article-title":"Resource allocation for spectrum underlay in cognitive radio networks","volume":"7","author":"Le","year":"2008","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b7","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/WCL.2012.091312.120600","article-title":"Aggregate interference analysis for underlay cognitive radio networks","volume":"1","author":"Kusaladharma","year":"2012","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"10.1016\/j.phycom.2020.101260_b8","doi-asserted-by":"crossref","unstructured":"K. Pathak, P. Bansal, A. Banerjee, Online time sharing policy in energy harvesting cognitive radio network with channel uncertainty, in: Proc. IEEE Glob. Commun. Conf. (GLOBECOM 2017), Singapore, Singapore, 4-8 Dec, 2017, pp. 1\u20136, http:\/\/dx.doi.org\/10.1109\/GLOCOM.2017.8254598.","DOI":"10.1109\/GLOCOM.2017.8254598"},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b9","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/LWC.2017.2676102","article-title":"Joint power control and time allocation for wireless powered underlay cognitive radio networks","volume":"6","author":"Xu","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b10","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1109\/JIOT.2019.2953130","article-title":"Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry","volume":"7","author":"Ge","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.phycom.2020.101260_b11","doi-asserted-by":"crossref","unstructured":"J. Oh, W. Choi, A hybrid cognitive radio system: A combination of underlay and overlay approaches, in: Proc. IEEE Veh. Technol. Conf. (VTC 2010), Ottawa, ON, Canada, 6-9 Sep., 2010, pp. 1\u20135, http:\/\/dx.doi.org\/10.1109\/VETECF.2010.5594302.","DOI":"10.1109\/VETECF.2010.5594302"},{"issue":"1","key":"10.1016\/j.phycom.2020.101260_b12","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1186\/s13638-016-0700-7","article-title":"Hybrid spectrum access with relay assisting both primary and secondary networks under imperfect spectrum sensing","volume":"2016","author":"Chinh\u00a0Chu","year":"2016","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b13","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11277-016-3516-1","article-title":"Hybrid overlay\/underlay transmission scheme with optimal resource allocation for primary user throughput maximization in cooperative cognitive radio networks","volume":"91","author":"Preetham","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.phycom.2020.101260_b14","doi-asserted-by":"crossref","unstructured":"R. Amer, A.A. El-sherif, H. Ebrahim, A. Mokhtar, Cooperation and underlay mode selection in cognitive radio network, in: Proc. Fifth Int. Conf. Future Generation Commun. Technol. (FGCT 2016), Luton, UK, 17-19 Aug., 2016, pp. 36\u201341, http:\/\/dx.doi.org\/10.1109\/FGCT.2016.7605066.","DOI":"10.1109\/FGCT.2016.7605066"},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b15","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1109\/TWC.2012.032712.101209","article-title":"Throughput analysis of opportunistic access strategies in hybrid underlay-overlay cognitive radio networks","volume":"11","author":"Senthuran","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.phycom.2020.101260_b16","doi-asserted-by":"crossref","unstructured":"V.K. Dwivedi, B.T. Maharaj, A.S. Alfa, On the queue based performance analysis of hybrid cognitive radio, in: Proc. Int. Conf. Signal Process. Commun. (ICSC 2016), Noida, India, 26-28 Dec, 2016, pp. 169\u2013173, http:\/\/dx.doi.org\/10.1109\/ICSPCom.2016.7980570.","DOI":"10.1109\/ICSPCom.2016.7980570"},{"issue":"10","key":"10.1016\/j.phycom.2020.101260_b17","doi-asserted-by":"crossref","first-page":"11253","DOI":"10.1109\/TVT.2020.3008671","article-title":"An optimal policy for hybrid channel access in cognitive radio networks with energy harvesting","volume":"69","author":"Tayel","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b18","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/COMST.2014.2368999","article-title":"Wireless networks with RF energy harvesting: A contemporary survey","volume":"17","author":"Lu","year":"2015","journal-title":"IEEE Commun. Surveys Tut."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b19","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MWC.2014.6845054","article-title":"Dynamic spectrum access in cognitive radio networks with RF energy harvesting","volume":"21","author":"Lu","year":"2014","journal-title":"IEEE Wirel. Commun."},{"issue":"8","key":"10.1016\/j.phycom.2020.101260_b20","doi-asserted-by":"crossref","first-page":"7114","DOI":"10.1109\/TVT.2017.2673861","article-title":"Optimal spectrum access and energy supply for cognitive radio systems with opportunistic RF energy harvesting","volume":"66","author":"Pratibha","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"10.1016\/j.phycom.2020.101260_b21","doi-asserted-by":"crossref","first-page":"3659","DOI":"10.1109\/TCOMM.2017.2710338","article-title":"Ambient backscatter: A new approach to improve network performance for RF-powered cognitive radio networks","volume":"65","author":"Hoang","year":"2017","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"10.1016\/j.phycom.2020.101260_b22","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1109\/TWC.2015.2408610","article-title":"Performance optimization for cooperative multiuser cognitive radio networks with RF energy harvesting capability","volume":"14","author":"Hoang","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"10.1016\/j.phycom.2020.101260_b23","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/WCL.2012.071612.120304","article-title":"Sensing and transmit energy optimization for an energy harvesting cognitive radio","volume":"1","author":"Sultan","year":"2012","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b24","doi-asserted-by":"crossref","first-page":"1386","DOI":"10.1109\/TWC.2013.012413.121009","article-title":"Cognitive radio networks with energy harvesting","volume":"12","author":"Park","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b25","doi-asserted-by":"crossref","first-page":"6166","DOI":"10.1109\/TWC.2013.103113.130018","article-title":"Optimal spectrum access for energy harvesting cognitive radio networks","volume":"12","author":"Park","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.phycom.2020.101260_b26","doi-asserted-by":"crossref","unstructured":"A.E. Shafie, A. Sultan, Optimal selection of spectrum sensing duration for an energy harvesting cognitive radio, in: Proc. IEEE Glob. Commun. Conf. (GLOBECOM 2013), Atlanta, GA, USA, 9-13 Dec., 2013, pp. 1020\u20131025,.","DOI":"10.1109\/GLOCOM.2013.6831208"},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b27","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/LCOMM.2013.042313.130086","article-title":"Optimal random access for a cognitive radio terminal with energy harvesting capability","volume":"17","author":"Shafie","year":"2013","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"10.1016\/j.phycom.2020.101260_b28","doi-asserted-by":"crossref","first-page":"3164","DOI":"10.1109\/JSEN.2014.2324565","article-title":"Access strategy for hybrid underlay-overlay cognitive radios with energy harvesting","volume":"14","author":"Usman","year":"2014","journal-title":"IEEE Sens. J."},{"issue":"9","key":"10.1016\/j.phycom.2020.101260_b29","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2015.7263345","article-title":"Securing physical-layer communications for cognitive radio networks","volume":"53","author":"Zou","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.phycom.2020.101260_b30","doi-asserted-by":"crossref","unstructured":"R. Chen, J. Park, Ensuring trustworthy spectrum sensing in cognitive radio networks, in: Proc. 1st IEEE Workshop Netw. Technol. Software Defined Radio Netw. (SDR 2006), Reston, VA, USA, 25-25 Sept., 2006, pp. 110\u2013119, http:\/\/dx.doi.org\/10.1109\/SDR.2006.4286333.","DOI":"10.1109\/SDR.2006.4286333"},{"key":"10.1016\/j.phycom.2020.101260_b31","series-title":"Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc 2005)","first-page":"46","article-title":"The feasibility of launching and detecting jamming attacks in wireless networks","author":"Xu","year":"2005"},{"issue":"4","key":"10.1016\/j.phycom.2020.101260_b32","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/SURV.2009.090404","article-title":"A survey on jamming attacks and countermeasures in WSNs","volume":"11","author":"Mpitziopoulos","year":"2009","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b33","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TCCN.2015.2488620","article-title":"Performance analysis of wireless energy harvesting cognitive radio networks under smart jamming attacks","volume":"1","author":"Hoang","year":"2015","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b34","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1109\/TII.2015.2399691","article-title":"Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack","volume":"12","author":"Zou","year":"2016","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.phycom.2020.101260_b35","doi-asserted-by":"crossref","unstructured":"R. Negi, S. Goel, Secret communication using artificial noise, in: IEEE Veh. Tech. Conf. (VTC Fall 2005)., Vol. 3, Dallas, TX, USA, 28-28 Sept., 2005, pp. 1906\u20131910, http:\/\/dx.doi.org\/10.1109\/VETECF.2005.1558439.","DOI":"10.1109\/VETECF.2005.1558439"},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b36","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","article-title":"Guaranteeing secrecy using artificial noise","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"1","key":"10.1016\/j.phycom.2020.101260_b37","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2015.7018202","article-title":"Improving physical-layer security in wireless communications using diversity techniques","volume":"29","author":"Zou","year":"2015","journal-title":"IEEE Netw."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b38","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/LCOMM.2016.2514353","article-title":"Secure beamforming in wireless-powered cooperative cognitive radio networks","volume":"20","author":"Jiang","year":"2016","journal-title":"IEEE Commun. Let."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b39","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1109\/TVT.2015.2412152","article-title":"Improving physical-layer security for CRNs using SINR-based cooperative beamforming","volume":"65","author":"Zhu","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b40","doi-asserted-by":"crossref","first-page":"10786","DOI":"10.1109\/JIOT.2019.2941873","article-title":"Beamforming design for physical layer security in a two-way cognitive radio IoT network with SWIPT","volume":"6","author":"Deng","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b41","doi-asserted-by":"crossref","first-page":"10236","DOI":"10.1109\/TVT.2016.2529704","article-title":"Secrecy outage on transmit antenna selection\/maximal ratio combining in MIMO cognitive radio networks","volume":"65","author":"Zhao","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b42","doi-asserted-by":"crossref","first-page":"10126","DOI":"10.1109\/TVT.2016.2536801","article-title":"Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over nakagami-m channels","volume":"65","author":"Lei","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b43","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/TGCN.2017.2684827","article-title":"On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection","volume":"1","author":"Lei","year":"2017","journal-title":"IEEE Trans. Green Commun. Netw."},{"issue":"1","key":"10.1016\/j.phycom.2020.101260_b44","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MWC.2017.1700015","article-title":"Jamming strategies for physical layer security","volume":"25","author":"Huo","year":"2018","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"10.1016\/j.phycom.2020.101260_b45","doi-asserted-by":"crossref","first-page":"3500","DOI":"10.1109\/TVT.2019.2895639","article-title":"A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks","volume":"68","author":"Wen","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.phycom.2020.101260_b46","series-title":"IEEE Wireless Commun. Netw. Conf. (WCNC 2018), Barcelona, Spain, 15-18 Apr.","first-page":"1","article-title":"Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems","author":"Su","year":"2018"},{"key":"10.1016\/j.phycom.2020.101260_b47","doi-asserted-by":"crossref","unstructured":"S. Jia, J. Zhang, H. Zhao, Y. Xu, Relay selection for improved security in cognitive relay networks with artificial noise, in: Proc. IEEE 87th Veh. Technol. Conf. (VTC Spring 2018), Porto, Portugal, 3-6 June, 2018, pp. 1\u20135, http:\/\/dx.doi.org\/10.1109\/VTCSpring.2018.8417696.","DOI":"10.1109\/VTCSpring.2018.8417696"},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b48","doi-asserted-by":"crossref","first-page":"2431","DOI":"10.1109\/JSYST.2018.2883491","article-title":"Resource allocation for secure communications in cooperative cognitive wireless powered communication networks","volume":"13","author":"Xu","year":"2019","journal-title":"IEEE Syst. J."},{"issue":"10","key":"10.1016\/j.phycom.2020.101260_b49","doi-asserted-by":"crossref","DOI":"10.1002\/dac.3228","article-title":"Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting","volume":"30","author":"Maji","year":"2017","journal-title":"Int. J. Commun. Syst."},{"issue":"2","key":"10.1016\/j.phycom.2020.101260_b50","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1007\/s11276-019-02183-4","article-title":"Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing","volume":"26","author":"Maji","year":"2020","journal-title":"Wireless Netw."},{"key":"10.1016\/j.phycom.2020.101260_b51","doi-asserted-by":"crossref","unstructured":"W. Mou, W. Yang, X. Xu, X. Li, Y. Cai, Secure transmission in spectrum-sharing cognitive networks with wireless power transfer, in: Proc. 8th Int. Conf. Wireless Commun. Signal Process. (WCSP 2016), Yangzhou, China, 13-15 Oct., 2016, pp. 1\u20135, http:\/\/dx.doi.org\/10.1109\/WCSP.2016.7752665.","DOI":"10.1109\/WCSP.2016.7752665"},{"key":"10.1016\/j.phycom.2020.101260_b52","first-page":"1","article-title":"Energy harvesting cognitive radio networks: Security analysis for nakagami-m fading","author":"Do-Dac","year":"2019","journal-title":"Wireless Netw."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b53","doi-asserted-by":"crossref","first-page":"11858","DOI":"10.1109\/TVT.2018.2876062","article-title":"Secrecy energy efficiency optimization for artificial noise aided physical-layer security in OFDM-based cognitive radio networks","volume":"67","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.phycom.2020.101260_b54","doi-asserted-by":"crossref","first-page":"64836","DOI":"10.1109\/ACCESS.2018.2878058","article-title":"Relay selection for improved physical layer security in cognitive relay networks using artificial noise","volume":"6","author":"Jia","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.phycom.2020.101260_b55","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2019.100953","article-title":"Multiple access schemes for cognitive radio networks: A survey","volume":"38","author":"Kumar","year":"2020","journal-title":"Phys. Commun."},{"issue":"7","key":"10.1016\/j.phycom.2020.101260_b56","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1109\/JSAC.2018.2824624","article-title":"Secure NOMA based two-way relay networks using artificial noise and full duplex","volume":"36","author":"Zheng","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"10.1016\/j.phycom.2020.101260_b57","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1049\/iet-com.2017.0384","article-title":"Power efficiency optimisation of wireless-powered full-duplex relay systems","volume":"12","author":"Chen","year":"2018","journal-title":"IET Commun."},{"issue":"3","key":"10.1016\/j.phycom.2020.101260_b58","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/LWC.2017.2778146","article-title":"Optimal power and time allocation for WPCNs with piece-wise linear EH model","volume":"7","author":"Pejoski","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"12","key":"10.1016\/j.phycom.2020.101260_b59","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1109\/LCOMM.2015.2478460","article-title":"Practical non-linear energy harvesting model and resource allocation for SWIPT systems","volume":"19","author":"Boshkovska","year":"2015","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"10.1016\/j.phycom.2020.101260_b60","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1109\/TWC.2008.060869","article-title":"Sensing-throughput tradeoff for cognitive radio networks","volume":"7","author":"Liang","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.phycom.2020.101260_b61","series-title":"Proc. IEEE Global Commun. Conf. (GLOBECOM 2012), California, USA, 3-7 Dec.","first-page":"4868","article-title":"Physical layer security in wireless networks with passive and active eavesdroppers","author":"Chorti","year":"2012"},{"issue":"6","key":"10.1016\/j.phycom.2020.101260_b62","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1049\/iet-com.2017.0719","article-title":"Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming","volume":"12","author":"Zheng","year":"2018","journal-title":"IET Commun."},{"key":"10.1016\/j.phycom.2020.101260_b63","unstructured":"J. Pineau, G. Gordon, S. Thrun, Point-based value iteration: An anytime algorithm for POMDPs, in: Proc. 18th Int. Joint Conf. Artif. Intell. (IJCAI 2003), Vol. 3, Acapulco, Mexico, 2003, pp. 1025\u20131032."},{"key":"10.1016\/j.phycom.2020.101260_b64","series-title":"Tight performance bounds on greedy policies based on imperfect value functions","author":"Williams","year":"1993"}],"container-title":["Physical Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490720303372?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490720303372?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T13:05:54Z","timestamp":1614603954000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874490720303372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":64,"alternative-id":["S1874490720303372"],"URL":"https:\/\/doi.org\/10.1016\/j.phycom.2020.101260","relation":{},"ISSN":["1874-4907"],"issn-type":[{"value":"1874-4907","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing hybrid channel access cognitive radio networks with energy harvesting","name":"articletitle","label":"Article Title"},{"value":"Physical Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.phycom.2020.101260","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101260"}}