2020
DOI: 10.1007/s11277-020-07600-y
|View full text |Cite
|
Sign up to set email alerts
|

Countermeasures for Primary User Emulation Attack: A Comprehensive Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 92 publications
0
2
0
Order By: Relevance
“…Mishra et al implemented deep learning-based denoting by improving the deep network structure. In the literature [8], the authors used ResNet to remove rain noise from photographs and the experimental results showed that the model has superior denoting performance [9]. Gupta [8].…”
Section: Related Workmentioning
confidence: 99%
“…Mishra et al implemented deep learning-based denoting by improving the deep network structure. In the literature [8], the authors used ResNet to remove rain noise from photographs and the experimental results showed that the model has superior denoting performance [9]. Gupta [8].…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, cloud radio access network (CRAN) faces serious challenges of security threats and trust problems because of its transmission nature and selforganizing feature. Therefore, due to limited spectral and energy resources and increased number of connected devices, the malicious users cause spectrum unavailability to legitimate users by competing for the available spectrum with the PUs [4]. Therefore, there is a need for security approaches to sense and remove attacks from the system without affecting spectral and energy utilization and causing delay.…”
Section: Introductionmentioning
confidence: 99%