Figure 2From: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks Taxonomy of (security) threats against the cognitive nature of CR environments. Back to article page