[1]
|
S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, 2005, pp. 201-220.
doi:10.1109/JSAC.2004.839380
|
[2]
|
S. M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory,” Prentice Hall, Upper Saddle River, 1998.
|
[3]
|
H. V. Poor, “An Introduction to Signal Detection and Estimation,” Springer-Verlag, New York, 1994.
|
[4]
|
S. Enserink and D. Cochran, “A Cyclostationary Feature Detector,” Proceedings of the 28th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, 31 October-2 November 1994, pp. 806-810.
doi:10.1109/ACSSC.1994.471573
|
[5]
|
P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing Techniques for Cognitive Radio System,” IEEE International Conference on Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
|
[6]
|
B. Shen and K. S. Kwak, “Soft Combination Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks,” ETRI Journal, Vol. 31, No. 3, 2009, pp. 263-270.
doi:10.4218/etrij.09.0108.0501
|
[7]
|
D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” Proceedings of 38th Asilomar Conference on Signals, Systems, Computers, Pacific Grove, 7-10 November 2004, pp. 772-776.
|
[8]
|
R. L. Chen, J.-M. Park and K. G. Bian, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks,” Proceedings of the 27th Annual IEEE Conference on Computer Communications, Phoenix, 13-18 April 2008, pp. 1876-1884.
|
[9]
|
K. J. Peng and Z. H. Tsai, “A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio,” Proceedings of the 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, 11-14 September 2006, pp. 1-5. doi:10.1109/PIMRC.2006.254089
|
[10]
|
N.-T. Nhan and I. Koo, “A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio,” Proceedings of the Intelligent Computing 5th International Conference on Emerging Intelligent Computing Technology and Applications, Vol. 5755, 2009, pp. 698-707.
|
[11]
|
S. Y. Xu, Y. L. Shang and H. M. Wang, “Double Thresholds Based Cooperative Spectrum Sensing against Untrusted Secondary Users in Cognitive Radio Networks,” IEEE International Vehicular Technology Conference, Barcelona, 26-29 April 2009, pp. 1-5.
|
[12]
|
W. K. Wang, H. S.Li, Y. Sun and Z. Han, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks,” IEEE Annual Conf. on Information Sciences and Systems, Baltimore, 18-20 March 2009, pp. 130-134.
|
[13]
|
E. MoeenTaghavi and B. Abolhassani, “Trustworthy Node Detection in Cognitive Radio in Hostile Environments,” International Conference on Communication and Electronics Information, Vol. 2, 2011, pp. 258-262.
|
[14]
|
P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Malicious User Detection in a Cognitive Radio Cooperative Sensing System,” IEEE Transaction on Wireless Communications, Vol. 9, No. 8, 2010, pp. 2488-2497.
|
[15]
|
L. A. ZADEH, “Fuzzy Sets,” Information and Control, Vol. 8, No. 3, 1965, pp. 338-353.
doi:10.1016/S0019-9958(65)90241-X
|
[16]
|
L. A. ZADEH, “Fuzzy Algorithms,” Information and Control, Vol. 12, 1968, pp. 94-102.
doi:10.1016/S0019-9958(68)90211-8
|
[17]
|
W. El-Hajj, F. Aloul, Z. Trabelsi and N. Zaki, “On Detecting Port Scanning Using Fuzzy Based Intrusion Detection System,” International Conference on Wireless Communications and Mobile Computing, Crete Island, 6-8 August 2008, pp. 105-110.
|