Evaluating physical-layer security for secondary users in cognitive radio systems with attackers | IEEE Conference Publication | IEEE Xplore