This document discusses security threats and detection techniques in cognitive radio networks. It begins by providing background on cognitive radio networks and how secondary users can utilize unused spectrum bands of primary users. However, this can introduce security issues if malicious users emulate primary users. The document then discusses two main threats: primary user emulation attacks, where fake secondary users pretend to be primary users and disrupt communications, and jamming attacks. It proposes using energy spectrum sensing techniques for secondary users to detect unused spectrum bands while avoiding interfering with primary users. The document concludes that cognitive radio networks introduce practical wireless communication challenges, and future work is needed to improve security against identified threats.