{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:01:01Z","timestamp":1729634461838,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6884103","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"4939-4944","source":"Crossref","is-referenced-by-count":1,"title":["Detecting the greedy spectrum occupancy threat in cognitive radio networks"],"prefix":"10.1109","author":[{"given":"Songjun","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yunfeng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoying","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinbing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426267"},{"key":"17","volume":"2","author":"cooper","year":"1981","journal-title":"Introduction to Queueing Theory"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970104"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963248"},{"key":"16","volume":"1","author":"kleinrock","year":"1975","journal-title":"Queueing Systems Wiley-Interscience"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.031313.121551"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523808"},{"key":"11","article-title":"Attack-proof collaborative spectrum sensing in cognitive radio networks","author":"wang","year":"2009","journal-title":"Proc CISS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425380"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566886"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.1403008"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.231"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100315"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935184"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566859"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566941"},{"key":"9","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TWC.2010.112310.100630","article-title":"Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems?part ii: Unknown channel statistics","volume":"10","author":"li","year":"2011","journal-title":"IEEE Trans Wireless Commun"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06884103.pdf?arnumber=6884103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:15Z","timestamp":1498146615000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6884103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6884103","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}