[1] J. Mitola, GQ. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communication, 6(4) (1999) 13-18.
[2] S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, 23(2) (2005) 201-220.
[3] IF. Akyildiz, WY. Lee, MC. Vuran, S. Mohanty, NeXt generation/dynamic spectrum access cognitive radio wireless networks: A survey, Computer Networks, 50(13) (2006) 2127-2159.
[4] T. Yucek, H. Arsalan, A survey of spectrum sensing algorithms for cognitive radio applications, IEEE Communications Surveys & Tutorials, 11(1) (2009) 116- 130.
[5] SM. Mishra, A. Sahai, RW. Brodersen, Cooperative sensing among cognitive radios, In Proceedings of the IEEE International Conference on Communications, (2006) 1658-1663.
[6] IF. Akyildiz, Lo BF, R. Balakrishnan, Cooperative spectrum sensing in cognitive radio networks: A survey, Physical Communication, 40(1) (2011) 40-62.
[7] R. Chen, J. m. Park, Y. T. Hou, J. H. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Communications Magazine, 46(4) (2008) 50-55.
[8] R. Chen, J. Park, K. Bian, Robust distributed spectrum sensing in cognitive radio networks, In Proceedings of IEEE International Conference on Computer Communications (INFOCOM), (2008) 31-35.
[9] AS. Rawat, P. Anand, H. Chen, PK. Varshney, Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, IEEE Transactions on Signal Processing, 59(2) (2011) 774- 786.
[10] R. Chen, J. Park, K. Bian, Robustness against Byzantine failures in distributed spectrum sensing, Computer Communication, 35(17) (2012) 2115-2124.
[11] CY. Chen, YH. Chou, HC. Chao, Lo. CH, Secure centralized spectrum sensing for cognitive radio networks, Wireless Networks, 18(6) (2012) 667-677.
[12] K. Arshad, K. Moessner, Robust collaborative spectrum sensing in the presence of deleterious users, IET Communications, 7(1) (2013) 49-56.
[13] V. Chen, M. Song, C. Xin, CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks, Wireless Networks, 20(8) (2014) 2521-2528.
[14] C. S. Hyder, B. Grebur, L. Xiao, M. Ellison, ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacks, IEEE Transactions on Mobile Computing, 13(8) (2014) 1707-1719.
[15] A. A. Sharifi, M. Sharifi, J. Musevi Niya, Reputation-based likelihood ratio test with anchor nodes assistance, 8th International Symposium on Telecommunications, (2016) 51-56.
[16] A. A. Sharifi, M. J. Musevi Niya, Defense against SSDF attack in cognitive radio networks: attack-aware collaborative spectrum sensing approach, IEEE Communications Letters, 20(1) (2016) 93-96.
[17] A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis, A survey on security threats and detection techniques in cognitive radio networks, IEEE Communications Surveys & Tutorials, 15(1) (2013) 428-445.
[18] L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han, J. Wang, Byzantine attack and defense in cognitive radio networks: A survey, IEEE Communications Surveys & Tutorials, 17(3) (2015) 1342-1363.
[19] H. Urkowitz, Energy detection of unknown deterministic signals, Proceedings of the IEEE, 55(4) (1967) 523-531.
[20] F. F. Digham, M. S. Alouini, M. K. Simon, On the energy detection of unknown signals over fading channels, IEEE Transactions on Communications, 55(1) (2007) 21-24.
[21] T. S. Rappaport, Wireless communications: Principles and Practice, Prentice Hall, (1996).
[22] PK. Varshney, Distributed detection and data fusion, Springer-Verlag, (1997).