{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:11Z","timestamp":1725881531176},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_32","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"313-323","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network"],"prefix":"10.1007","author":[{"family":"Deepa","sequence":"first","affiliation":[]},{"given":"Jayashree","family":"Agarkhed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"32_CR1","unstructured":"M. Kaushik, A.K. Kaushik, S. Kaushik, An overview of technical aspect for mobile network technology. Int. J. Adv. Eng. Sci. Technol. (IJAEST) 1(02), 97\u2013103 (2012). ISSN: 2319\u20131120"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"A. Alahmadi, M. Abdelhakim, J. Ren, T. Li, Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard, in Global Communications Conference (GLOBECOM), 2013 IEEE (IEEE, 2013), pp. 3229\u20133234","DOI":"10.1109\/GLOCOM.2013.6831569"},{"issue":"1","key":"32_CR3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"R. Chen, J.M. Park, J.H. Reed, Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(1), 25\u201337 (2008)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"S. Capkun, M. Srivastava, M. Cagalj, Securing localization with hidden and mobile base stations, in IEEE Conference on Computer Communications (INFOCOM) (2006)","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"W. Wang, H. Li, Y.L. Sun, Z. Han,. Attack-proof collaborative spectrum sensing in cognitive radio networks, in 43rd Annual Conference on Information Sciences and Systems, 2009. CISS 2009 (IEEE, 2009), pp. 130\u2013134","DOI":"10.1109\/CISS.2009.5054704"},{"issue":"8","key":"32_CR6","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1049\/iet-com.2010.0573","volume":"6","author":"Y Tan","year":"2012","unstructured":"Y. Tan, S. Sengupta, K.P. Subbalakshmi, Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun. 6(8), 964\u2013973 (2012)","journal-title":"IET Commun."},{"issue":"7","key":"32_CR7","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1109\/TWC.2011.041311.100626","volume":"10","author":"C Chen","year":"2011","unstructured":"C. Chen, H. Cheng, Y.D. Yao, Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack. IEEE Trans. Wirel. Commun. 10(7), 2135\u20132141 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"S. Arkoulis, L. Kazatzopoulos, C. Delakouridis, G.F. Marias Cognitive spectrum and its security issues, in The Second International Conference on Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST\u201908 (IEEE, 2008), pp. 565\u2013570","DOI":"10.1109\/NGMAST.2008.102"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"A. Ghasemi, E.S. Sousa, Opportunistic spectrum access in fading channels through collaborative sensing. J. Commun. 2(2), 71\u201382 (2007)","DOI":"10.4304\/jcm.2.2.71-82"},{"issue":"6","key":"32_CR10","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MWC.2012.6393525","volume":"19","author":"Z Gao","year":"2012","unstructured":"Z. Gao, H. Zhu, S. Li, S. Du, X. Li, Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wirel. Commun. 19(6), 106\u2013112 (2012)","journal-title":"IEEE Wirel. Commun."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"E. Romero, A. Mouradian, J. Blesa, J. Moya, A Araujo, Simulation framework for security threats in cognitive radio networks. IET Commun. 6(8), 984\u2013990 (2012)","DOI":"10.1049\/iet-com.2010.0582"},{"key":"32_CR12","unstructured":"Z. Chen, T. Cooklev, C. Chen, C. Pomalaza-R\u00e1ez, Modeling primary user emulation attacks and defenses in cognitive radio networks, in 2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC) (IEEE, 2009), pp. 208\u2013215"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"D. Pu, Y. Shi, A.V. Ilyashenko, A.M. Wyglinski, Detecting primary user emulation attack in cognitive radio networks, in 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) (IEEE, 2011), pp. 1\u20135","DOI":"10.1109\/GLOCOM.2011.6134419"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T03:00:58Z","timestamp":1568862058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}