{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T22:18:45Z","timestamp":1681510725201},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Natural Sciences and Engineering Research Council (NSERC) of Canada","award":["395689-09","RGPIN 1731-2013"],"award-info":[{"award-number":["395689-09","RGPIN 1731-2013"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Wireless Commun. Lett."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/lwc.2015.2422820","type":"journal-article","created":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T18:38:39Z","timestamp":1429036719000},"page":"377-380","source":"Crossref","is-referenced-by-count":3,"title":["Transient Analysis for a Trust-Based Cognitive Radio Collaborative Spectrum Sensing Scheme"],"prefix":"10.1109","volume":"4","author":[{"given":"Seyed Ali","family":"Mousavifar","sequence":"first","affiliation":[]},{"given":"Cyril","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952237"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1967.5573"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.887483"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2091277"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2196","DOI":"10.1109\/JSAC.2013.131119","article-title":"HMM-based malicious user detection for robust collaborative spectrum sensing","volume":"31","author":"he","year":"2013","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2009.5054704"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562451"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2059690"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081710"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.081331"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2004.1270548"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2377017"},{"key":"ref9","author":"curtis","year":"2004","journal-title":"Applied Cryptography and Network Security"}],"container-title":["IEEE Wireless Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962382\/7214342\/07086048.pdf?arnumber=7086048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:23Z","timestamp":1642003403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7086048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":15,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/lwc.2015.2422820","relation":{},"ISSN":["2162-2337","2162-2345"],"issn-type":[{"value":"2162-2337","type":"print"},{"value":"2162-2345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8]]}}}