“…In recent years, numerous research works have been proposed for investigating the PHY security of CR systems, among which several techniques have been proposed to improve the PHY security of CR systems. The proposed solutions reported in the literature can be mainly classified into different categories, such as (i) beamforming‐based [15–17], (ii) radio resource allocation‐based [17, 18], (iii) relay‐assisted transmission [18–20], (iv) transmit antenna selection [21–24], (v) jamming‐based [11, 16], and (vi) game theoretic‐based [25] techniques and algorithms. For instance, the authors in [17] have investigated the PHY security of joint beamforming and power allocation scheme in a CR network.…”