{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:09:57Z","timestamp":1730275797127,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/ispacs.2016.7824676","type":"proceedings-article","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T21:15:35Z","timestamp":1484860535000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["A single iteration belief propagation algorithm to minimize the effects of primary user emulation attacks"],"prefix":"10.1109","author":[{"given":"Sasa","family":"Maric","sequence":"first","affiliation":[]},{"given":"Sam","family":"Reisenfeld","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Goratti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding","author":"xiea","year":"2014","journal-title":"Journal of Ubiquitous Systems and Pervasive Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24540-9_38"},{"key":"ref10","first-page":"112","article-title":"Defense against primary user emulation attacks in cognitive radio networks","volume":"26","author":"patzold","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2012.6261113"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158697"},{"key":"ref7","first-page":"44","article-title":"Encryption and displacement based scheme of defense against primary user emulation attack","volume":"4","author":"zhou","year":"2011","journal-title":"Wireless Mobile and Multimedia Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"ref9","first-page":"2282","article-title":"Understanding belief propagation and its generalizations","author":"yedidia","year":"2012","journal-title":"Exploring Artificial Intelligence in the New Millennium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"}],"event":{"name":"2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","start":{"date-parts":[[2016,10,24]]},"location":"Phuket","end":{"date-parts":[[2016,10,27]]}},"container-title":["2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818101\/7824673\/07824676.pdf?arnumber=7824676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:29:49Z","timestamp":1522974589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7824676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ispacs.2016.7824676","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}