{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:25:48Z","timestamp":1759227948567,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024618","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"page":"754-759","source":"Crossref","is-referenced-by-count":10,"title":["A distributed Cooperative Spectrum Resource Allocation in smart home cognitive wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Sabrine","family":"Aroua","sequence":"first","affiliation":[]},{"given":"Ines","family":"El Korbi","sequence":"additional","affiliation":[]},{"given":"Yacine","family":"Ghamri-Doudane","sequence":"additional","affiliation":[]},{"given":"Leila Azouz","family":"Saidane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICC.2012.6364611"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2012.2225650"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TVT.2014.2387377"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SAHCN.2015.7338343"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2013.03.005","article-title":"Surf: A distributed channel selection strategy for data dissemination in multihop cognitive radio networks","volume":"36","author":"rehmani","year":"2013","journal-title":"Comput Commun"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIE.2009.2039455"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/COMST.2014.2363082"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICWISE.2015.7380352"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/BSC.2010.5473004"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/S0004-3702(98)00023-X"},{"key":"ref5","first-page":"428","article-title":"A survey on security threats and detection techniques in cognitive radio networks","author":"fragkiadakis","year":"2012","journal-title":"IEEE Commun Surveys Tutorials"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IMIS.2016.130"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSG.2011.2114678"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIE.2014.2379586"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2011.07.010"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TSG.2012.2227282"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024618.pdf?arnumber=8024618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T23:52:21Z","timestamp":1570060341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024618\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024618","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}