has been cited by the following article(s):
[1]
|
Analysis on Trustworthiness of Secondary Users using Machine Learning Approaches in Cognitive Radio Network Environment.
2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC),
2020
DOI:10.1109/iSSSC50941.2020.9358906
|
|
|
[2]
|
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
Wireless Engineering and Technology,
2016
DOI:10.4236/wet.2016.72007
|
|
|