{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:19:47Z","timestamp":1761743987597},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/cts.2014.6867559","type":"proceedings-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T18:33:03Z","timestamp":1407522783000},"page":"158-165","source":"Crossref","is-referenced-by-count":4,"title":["Securing cognitive radio networks against belief manipulation attacks via trust management"],"prefix":"10.1109","author":[{"given":"Onur","family":"Savas","sequence":"first","affiliation":[]},{"given":"Gahng Seop","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567251"},{"journal-title":"A Testbed for Comparing Trust Computation Algorithms","year":"0","author":"theodorakopoulos","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426033"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.266"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2045403"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447736"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684069"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2183771"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2093210"},{"journal-title":"Cognitive Radio Communications and Networks Principles and Practices","year":"2010","author":"wyglinski","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"6","article-title":"MAC-layer misbehaviors in multi-hop cognitive radio networks","author":"bian","year":"2006","journal-title":"2006 US-Korea Conference on Science Technology and Entrepreneurship (UKC2006)"},{"key":"5","article-title":"Defense against spectrum sensing data falsification attacks in cognitive radio networks","author":"hyder","year":"2011","journal-title":"Proc of the SecureComm 2011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IWCLD.2009.5156526"}],"event":{"name":"2014 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2014,5,19]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2014,5,23]]}},"container-title":["2014 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6857934\/6867522\/06867559.pdf?arnumber=6867559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:46:16Z","timestamp":1490305576000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6867559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cts.2014.6867559","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}