![Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks](https://www.mdpi.com/sensors/sensors-20-05700/article_deploy/html/images/sensors-20-05700-g002.png)
Sensors | Free Full-Text | Interference Spreading through Random Subcarrier Allocation Technique and Its Error Rate Performance in Cognitive Radio Networks
![Sensors | Free Full-Text | Efficient Channel Allocation using Matching Theory for QoS Provisioning in Cognitive Radio Networks Sensors | Free Full-Text | Efficient Channel Allocation using Matching Theory for QoS Provisioning in Cognitive Radio Networks](https://www.mdpi.com/sensors/sensors-20-01872/article_deploy/html/images/sensors-20-01872-g001.png)
Sensors | Free Full-Text | Efficient Channel Allocation using Matching Theory for QoS Provisioning in Cognitive Radio Networks
![Performance Analysis of Cognitive Radio Networks for Resource Sharing: All secondary users are not only opportunist but may be used as co-operative: Chapagain, Kamal, Adhikari, Nanda Bikram: 9783659610707: Amazon.com: Books Performance Analysis of Cognitive Radio Networks for Resource Sharing: All secondary users are not only opportunist but may be used as co-operative: Chapagain, Kamal, Adhikari, Nanda Bikram: 9783659610707: Amazon.com: Books](https://m.media-amazon.com/images/I/81SOcavm9vL._AC_UF1000,1000_QL80_.jpg)
Performance Analysis of Cognitive Radio Networks for Resource Sharing: All secondary users are not only opportunist but may be used as co-operative: Chapagain, Kamal, Adhikari, Nanda Bikram: 9783659610707: Amazon.com: Books
![Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks](https://www.mdpi.com/algorithms/algorithms-09-00025/article_deploy/html/images/algorithms-09-00025-g001.png)
Algorithms | Free Full-Text | Primary User Localization Algorithm Based on Compressive Sensing in Cognitive Radio Networks
![Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks](https://www.peertechzpublications.com/articles/figures/TCSIT-6-135-g002.gif)
Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks
![Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic](https://static.hindawi.com/articles/mpe/volume-2020/4102046/figures/4102046.fig.001.jpg)
Performance Evaluation of Cognitive Radio Networks with Imperfect Spectrum Sensing and Bursty Primary User Traffic
![An example of a secondary user, interfering with OFDMA primary users... | Download Scientific Diagram An example of a secondary user, interfering with OFDMA primary users... | Download Scientific Diagram](https://www.researchgate.net/publication/235781476/figure/fig1/AS:299759026884610@1448479529916/An-example-of-a-secondary-user-interfering-with-OFDMA-primary-users-uplink-transmission.png)
An example of a secondary user, interfering with OFDMA primary users... | Download Scientific Diagram
![A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram](https://www.researchgate.net/publication/264824800/figure/fig2/AS:295829765148672@1447542720040/A-Cognitive-Radio-Network-Architecture-with-Primary-and-Secondary-User-Networks.png)
A Cognitive Radio Network Architecture with Primary and Secondary User... | Download Scientific Diagram
![A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs13635-015-0021-0/MediaObjects/13635_2015_21_Fig1_HTML.gif)
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | EURASIP Journal on Information Security | Full Text
![Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/13a4d22f33debad386654e420a5af2dad7d255b8/1-Figure1-1.png)
Figure 1 from Energy-Infeasibility Tradeoff in Cognitive Radio Networks: Price-Driven Spectrum Access Algorithms | Semantic Scholar
![a) Overview of a cognitive radio system: secondary users may reuse the... | Download Scientific Diagram a) Overview of a cognitive radio system: secondary users may reuse the... | Download Scientific Diagram](https://www.researchgate.net/publication/316856885/figure/fig1/AS:633696461795330@1528096418891/a-Overview-of-a-cognitive-radio-system-secondary-users-may-reuse-the-same-frequency.png)
a) Overview of a cognitive radio system: secondary users may reuse the... | Download Scientific Diagram
![Figure 1 from Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks | Semantic Scholar Figure 1 from Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/d37f104ada026ca4ad778d42628a0a78c8e8d5bb/2-Figure1-1.png)
Figure 1 from Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks | Semantic Scholar
![Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks](https://www.mdpi.com/sensors/sensors-18-01809/article_deploy/html/images/sensors-18-01809-g001.png)
Sensors | Free Full-Text | Cooperative Feedback Bits Allocation and Transmit Power Control in Underlay Cognitive Radio Networks
![Optimized secondary user selection for quality of service enhancement of Two-Tier multi-user Cognitive Radio Network: A game theoretic approach - ScienceDirect Optimized secondary user selection for quality of service enhancement of Two-Tier multi-user Cognitive Radio Network: A game theoretic approach - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S1389128617301949-gr1.jpg)