{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:21:01Z","timestamp":1758709261137,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1145\/3427477.3429992","type":"proceedings-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T13:05:25Z","timestamp":1609333525000},"page":"56-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks"],"prefix":"10.1145","author":[{"given":"Abhishek","family":"Kumar","sequence":"first","affiliation":[{"name":"National Institute of Technology Hamirpur, IN"}]},{"given":"Nitin","family":"Gupta","sequence":"additional","affiliation":[{"name":"National Institute of Technology Hamirpur, IN"}]},{"given":"Riya","family":"Tapwal","sequence":"additional","affiliation":[{"name":"National Institute of Technology Hamirpur, IN"}]},{"given":"Jagdeep","family":"Singh","sequence":"additional","affiliation":[{"name":"Netaji Subhas Institute of Technology University of Delhi, New Delhi, IN"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3567"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848198"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352793.1352818"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"volume-title":"Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks. In 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 1\u20136.","year":"2018","author":"Dhurandher K","key":"e_1_3_2_1_6_1"},{"volume-title":"International Journal of Communication Systems","year":"2019","author":"Gupta Nitin","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nitin Gupta Sanjay\u00a0Kumar Dhurandher and Bhoopendra Kumar. 2019. Cognitive Radio Networks: A Comprehensive Review. In Handbook of Research on the IoT Cloud Computing and Wireless Network Optimization. IGI Global 491\u2013518.  Nitin Gupta Sanjay\u00a0Kumar Dhurandher and Bhoopendra Kumar. 2019. Cognitive Radio Networks: A Comprehensive Review. In Handbook of Research on the IoT Cloud Computing and Wireless Network Optimization. IGI Global 491\u2013518.","DOI":"10.4018\/978-1-5225-7335-7.ch021"},{"volume-title":"A Contract Theory Approach-Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks","year":"2019","author":"Gupta Nitin","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2007.4469340"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4621-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009466"},{"volume-title":"Ad Hoc Networks","author":"Mapunya Sekgoari","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394725"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.06.006"},{"key":"e_1_3_2_1_17_1","first-page":"133","article-title":"Attack-Aware Defense Strategy: A Robust Cooperative Spectrum Sensing in Cognitive Radio Sensor Networks. Iranian Journal of Science and Technology","volume":"43","author":"Sharifi Abbas\u00a0Ali","year":"2019","journal-title":"Transactions of Electrical Engineering"},{"volume-title":"Robust Statistics Evidence Based Secure Cooperative Spectrum Sensing for Cognitive Radio Networks. In 2020 International Wireless Communications and Mobile Computing (IWCMC)","author":"Simpson Oluyomi","key":"e_1_3_2_1_18_1"},{"volume-title":"Analogous Study of Security Threats in Cognitive Radio. In 2nd IEEE International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). 1\u20134.","year":"2019","author":"Sohu Izhar\u00a0Ahmed","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2009.5054704"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1811982.1812222"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.1083"},{"key":"e_1_3_2_1_23_1","unstructured":"Seyed Abdolazim\u00a0Vaziri Yazdi and Mahdieh Ghazvini. 2019. Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks. Wireless Personal Communications(2019) 1\u201317.  Seyed Abdolazim\u00a0Vaziri Yazdi and Mahdieh Ghazvini. 2019. Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks. Wireless Personal Communications(2019) 1\u201317."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC47757.2020.9049736"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2422735"}],"event":{"name":"ICDCN '21: International Conference on Distributed Computing and Networking 2021","acronym":"ICDCN '21","location":"Nara Japan"},"container-title":["Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427477.3429992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427477.3429992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:40Z","timestamp":1750195480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427477.3429992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":25,"alternative-id":["10.1145\/3427477.3429992","10.1145\/3427477"],"URL":"https:\/\/doi.org\/10.1145\/3427477.3429992","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}