1. Vadlamani, S., Medal, H., Eksioglu, B.: Security in wireless networks: a tutorial. In: Butenko, S., Pasiliao, E.L., Shylo, V. (eds.) Examining Robustness and Vulnerability of Networked Systems, pp. 272–289. IOS Press, Boston (2014)
2. Sharma, A., Ahuja, S., Uddin, M.: A survey on data fusion and security threats in CR networks. Int. J. Curr. Eng. Technol. 4, 1770–1778 (2014)
3. Poisel, R.A.: Modern Communications Jamming Principles and Techniques. Artech House Publishers, London (2006)
4. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005, 46–57 (2005)
5. Negi, R., Goel, S.: Secret communication using artificial noise. In: IEEE VTC 2005, pp. 1906–1910 (2005)