L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …