{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:39:04Z","timestamp":1742967544838,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623769"},{"type":"electronic","value":"9789811623776"}],"license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2377-6_55","type":"book-chapter","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T01:44:09Z","timestamp":1632447849000},"page":"599-610","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Addressing the Effects of the Spectrum Sensing Data Falsification Attack Using the Enhanced Q-out-of-m Rule"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1619-7429","authenticated-orcid":false,"given":"Velempini","family":"Mthulisi","sequence":"first","affiliation":[]},{"given":"Ngomane","family":"Issah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7691-0623","authenticated-orcid":false,"given":"Mapunya Sekgoari","family":"Semaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Mapunya S, Velempini M (2019) The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: Proceedings of 2018 international conference on intelligent and innovative computing applications (ICONIC), Holiday Inn Mauritius, Mon Tr\u00e9sor, Plaine Magnien, Mauritius","DOI":"10.1109\/ICONIC.2018.8601087"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"14255","DOI":"10.1109\/ACCESS.2018.2808479","volume":"6","author":"Z-H Wei","year":"2018","unstructured":"Wei Z-H, Hu B-J (2018) A fair multi-channel assignment algorithm with practical implementation in distributed cognitive radio networks. IEEE Access 6:14255\u201314267","journal-title":"IEEE Access"},{"issue":"7","key":"55_CR3","doi-asserted-by":"publisher","first-page":"6006","DOI":"10.1109\/TVT.2018.2809794","volume":"67","author":"KH Boddapati","year":"2018","unstructured":"Boddapati KH, Bhatnagar RM, Prakriya S (2018) Performance of incremental relaying protocols for cooperative multi-hop CRNs. IEEE Trans Veh Technol 67(7):6006\u20136022","journal-title":"IEEE Trans Veh Technol"},{"issue":"31","key":"55_CR4","first-page":"178","volume":"2","author":"SS Mapunya","year":"2019","unstructured":"Mapunya SS, Velempini M (2019) The design and implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks. South Afr Comput J 2(31):178\u2013194","journal-title":"South Afr Comput J"},{"key":"55_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/9047809","volume":"2020","author":"S Tephillah","year":"2020","unstructured":"Tephillah S, Manickam ML (2020) An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks. Wirel Commun Mob Comput 2020:1\u20139","journal-title":"Wirel Commun Mob Comput"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"11086","DOI":"10.1109\/ACCESS.2018.2810107","volume":"6","author":"E Osama","year":"2018","unstructured":"Osama E, Maha E, Osamu M, Hiroshi F (2018) Game theoretic approaches for cooperative spectrum sensing in energy-harvesting cognitive radio networks. IEEE Access 6:11086\u201311100","journal-title":"IEEE Access"},{"issue":"8","key":"55_CR7","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11276-014-0758-2","volume":"20","author":"C Chen","year":"2014","unstructured":"Chen C, Song M, Xin C (2014) CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Wireless Netw 20(8):2521\u20132528","journal-title":"Wireless Netw"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Ngomane I, Velempini M, Dlamini SV (2016) The design of a defence mechanism to mitigate the spectrum sensing data falsification attack in cognitive radio ad hoc networks. In: Proceedings of 2016 international conference on Advances in Computing and Communication Engineering (ICACCE), Durban, South Africa","DOI":"10.1109\/ICACCE.2016.8073754"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Tong J, Jin M, Guo Q, Li Y (2018) Cooperative spectrum sensing: a blind and soft fusion detector. IEEE Trans Wireless Commun 17(4), 2726\u20132737","DOI":"10.1109\/TWC.2018.2801833"},{"issue":"8","key":"55_CR10","doi-asserted-by":"publisher","first-page":"5244","DOI":"10.1109\/TWC.2017.2707407","volume":"16","author":"H Chen","year":"2017","unstructured":"Chen H, Zhou M, Xie L, Li J (2017) Cooperative spectrum sensing with M-Ary quantized data in cognitive radio networks under SSDF attacks. IEEE Trans Wireless Commun 16(8):5244\u20135257","journal-title":"IEEE Trans Wireless Commun"},{"issue":"2","key":"55_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/LCOMM.2017.2778713","volume":"22","author":"M Sun","year":"2017","unstructured":"Sun M, Jin M, Guo Q, Li Y (2017) Cooperative spectrum sensing under ambient malicious interferences. IEEE Commun Lett 22(2):432\u2013435","journal-title":"IEEE Commun Lett"},{"issue":"8","key":"55_CR12","first-page":"5764","volume":"6","author":"A Jadhav","year":"2015","unstructured":"Jadhav A, Shinde SC (2015) Centralized cooperative and non-cooperative spectrum sensing using energy detection in cognitive radio. Int J Recent Sci Res 6(8):5764\u20135767","journal-title":"Int J Recent Sci Res"},{"issue":"1","key":"55_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.phycom.2010.12.003","volume":"4","author":"I Akyildiz","year":"2011","unstructured":"Akyildiz I, Lo B, Balakrishnan R (2011) Cooperative spectrum sensing in cognitive radio networks: a survey. Phy Commun 4(1):40\u201362","journal-title":"Phy Commun"},{"issue":"1","key":"55_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/JSTSP.2010.2060468","volume":"5","author":"Q Chen","year":"2010","unstructured":"Chen Q, Motani M, Wong W-C, Nallanathan A (2010) Cooperative spectrum sensing strategies for cognitive radio mesh networks. IEEE J Select Topics Sign Proc 5(1):56\u201367","journal-title":"IEEE J Select Topics Sign Proc"},{"key":"55_CR15","doi-asserted-by":"publisher","first-page":"20089","DOI":"10.1109\/ACCESS.2017.2756992","volume":"5","author":"G Nie","year":"2017","unstructured":"Nie G, Ding G, Zhang L, Wu Q (2017) Byzantine defense in collaborative spectrum sensing via bayesian learning. IEEE Access 5:20089\u201320098","journal-title":"IEEE Access"},{"key":"55_CR16","doi-asserted-by":"publisher","first-page":"11007","DOI":"10.1109\/ACCESS.2018.2811341","volume":"6","author":"H Wang","year":"2018","unstructured":"Wang H, Yao Y-D, Peng S (2018) Prioritized secondary user access control in cognitive radio networks. IEEE Access 6:11007\u201311016","journal-title":"IEEE Access"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Seif M, Karmoose M, Youssef M (2015) Censoring for improved sensing performance in infrastructure-less cognitive radio networks. In: Proceedings of 2015 IEEE 81st vehicular technology conference, Glasgow, UK","DOI":"10.1109\/VTCSpring.2015.7145732"},{"key":"55_CR18","unstructured":"Chen C, Song M, Xin C (2013) A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. In: Proceedings of 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA"},{"key":"55_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379832","volume-title":"Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009\u20132009 IEEE Military Communications Conference","author":"FR Yu","year":"2009","unstructured":"Yu FR, Tang H, Huang M, Li Z, Mason P (2009) Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: MILCOM 2009\u20132009 IEEE Military Communications Conference. MA, USA, Boston"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Bai P, Zhang X, Ye F (2017) Reputation-based Beta reputation system against SSDF attack in cognitive radio networks. In: Proceedings of 2017 Progress in Electromagnetics Research Symposium, PIERS","DOI":"10.1109\/PIERS-FALL.2017.8293243"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2377-6_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T18:19:02Z","timestamp":1644430742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2377-6_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"ISBN":["9789811623769","9789811623776"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2377-6_55","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"24 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}