{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:05:09Z","timestamp":1748664309102,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234397"},{"type":"electronic","value":"9783319234403"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23440-3_9","type":"book-chapter","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T15:13:17Z","timestamp":1440429197000},"page":"108-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fair Allocation of Throughput Under Harsh Operational Conditions"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[]},{"given":"Shweta","family":"Sagari","sequence":"additional","affiliation":[]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"9_CR1","unstructured":"The ATM forum Technical Committee: Traffic management specification (April 1996). http:\/\/www.broadband-forum.org\/ftp\/pub\/approved-specs\/af-tm-0056.000.pdf (version 4.0)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1002\/ett.4460080106","volume":"8","author":"FP Kelly","year":"1998","unstructured":"Kelly, F.P.: Charging and rate control for elastic traffic. European Trans. on Telecom. 8, 33\u201337 (1998)","journal-title":"European Trans. on Telecom."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Tall, A., Altman, Z., Altman, E.: Virtual sectorization: design and self-optimization. In: 5th International Workshop on Self-Organizing Networks (IWSON) (2015)","DOI":"10.1109\/VTCSpring.2015.7146161"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/90.879343","volume":"8","author":"J Mo","year":"2000","unstructured":"Mo, J., Walrand, J.: Fair end-to-end window-based congestion control. IEEE\/ACM Trans. on Networking 8, 556\u2013567 (2000)","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.peva.2011.10.001","volume":"69","author":"P Jacko","year":"2012","unstructured":"Jacko, P., Sanso, B.: Optimal anticipative congestion control of flows with time-varying input stream. Performance Evaluation 69, 86\u2013101 (2012)","journal-title":"Performance Evaluation"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Generalized $$\\alpha $$-fair resource allocation in wireless networks. In: Proceedings of 47th IEEE Conference on Decision and Control (CDC 2008), pp. 2414\u20132419 (2008)","DOI":"10.1109\/CDC.2008.4738709"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.peva.2009.08.002","volume":"67","author":"E Altman","year":"2010","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Performance Evaluation 67, 338\u2013349 (2010)","journal-title":"Performance Evaluation"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/SURV.2013.050113.00015","volume":"16","author":"S Huaizhou","year":"2014","unstructured":"Huaizhou, S., Prasad, R.V., Onur, E., Niemegeers, I.G.M.M.: Fairness in wireless networks:issues, measures and challenges. IEEE Communications Surveys & Tutorials 16, 5\u201324 (2014)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/LCOMM.2013.102213.132056","volume":"18","author":"N Lyamin","year":"2014","unstructured":"Lyamin, N., Vinel, A., Jonsson, M., Loo, J.: Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications letters 18, 110\u2013113 (2014)","journal-title":"IEEE Communications letters"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Park, J.-M., Reed, J.H., Clancy, T.C.: Security and enforcement in spectrum sharing. Proceedings of the IEEE 102 (2014)","DOI":"10.1109\/JPROC.2014.2301972"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1016\/j.comcom.2013.06.003","volume":"36","author":"S Bhattacharjee","year":"2013","unstructured":"Bhattacharjee, S., Sengupta, S., Chatterjee, M.: Vulnerabilities in cognitive radio networks: A survey. Computer Communications 36, 1387\u20131398 (2013)","journal-title":"Computer Communications"},{"key":"9_CR12","unstructured":"El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. Journal of Internet Technology 12 (2012)"},{"key":"9_CR13","unstructured":"Khare, A., Saxena, M., Thakur, R.S., Chourasia, K.: Attacks and preventions of cognitive radio network-a survey. International Journal of Advanced Research in Computer Engineering and Technology 2 (2013)"},{"key":"9_CR14","volume-title":"Game theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game theory. MIT Press, Boston (1991)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Computing Survey 45 (2013)","DOI":"10.1145\/2480741.2480742"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/JSAC.2008.080928","volume":"26","author":"G Theodorakopoulos","year":"2008","unstructured":"Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications 26, 1317\u20131327 (2008)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9_CR17","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges to applying game theory to the domain of information warfare. In: Proceedings of ISW 2002 (2002)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TIFS.2014.2329241","volume":"9","author":"A Garnaev","year":"2014","unstructured":"Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Transactions on Information Forensics and Security 9, 1278\u20131287 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9_CR19","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-30373-9_30","volume-title":"Game Theory for Networks","author":"A Garnaev","year":"2012","unstructured":"Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) Gamenets 2011. LNICST, vol. 75, pp. 429\u2013443. Springer, Heidelberg (2012)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Comaniciu, C., Mani, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of Valuetools 2006 (2006)","DOI":"10.1145\/1190195.1190198"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s11276-007-0088-8","volume":"15","author":"YE Sagduyu","year":"2009","unstructured":"Sagduyu, Y.E., Ephremidess, A.: A game-theoretic analysis of denial of service attacks in wireless random access. Journal of Wireless Networks 15, 651\u2013666 (2009)","journal-title":"Journal of Wireless Networks"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-03871-1_15","volume-title":"Multiple Access Communcations","author":"A Garnaev","year":"2013","unstructured":"Garnaev, A., Trappe, W.: Stationary equilibrium strategies for bandwidth scanning. In: Jonsson, M., Vinel, A., Bellalta, B., Marina, N., Dimitrova, D., Fiems, D. (eds.) MACOM 2013. LNCS, vol. 8310, pp. 168\u2013183. Springer, Heidelberg (2013)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1054\u20131059 (2012)","DOI":"10.1109\/GLOCOM.2012.6503252"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: Proceedings of GAMENETS 2009, pp. 697\u2013703 (2009)","DOI":"10.1109\/GAMENETS.2009.5137463"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Calinescu, G., Kapoor, S., Qiao, K., Shin, J.: Stochastic strategic routing reduces attack effects. In: Proceedings of GLOBECOM 2011, pp. 1\u20135 (2011)","DOI":"10.1109\/GLOCOM.2011.6133863"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/TIFS.2015.2398360","volume":"10","author":"A Garnaev","year":"2015","unstructured":"Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Transactions on Information Forensics and Security 10, 1064\u20131075 (2015)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Xiao, L., Liu, J., Li, Y., Mandayam, N.B., Poor, H.V.: Prospect theoretic analysis of anti-jamming communications in cognitive radio networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 746\u2013751 (2014)","DOI":"10.1109\/GLOCOM.2014.7036897"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-319-10262-7_12","volume-title":"Multiple Access Communications","author":"A Garnaev","year":"2014","unstructured":"Garnaev, A., Trappe, W.: Secret communication when the eavesdropper might be an active adversary. In: Jonsson, M., Vinel, A., Bellalta, B., Belyaev, E. (eds.) MACOM 2014. LNCS, vol. 8715, pp. 121\u2013136. Springer, Heidelberg (2014)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Garnaev, A., Hayel, Y., Altman, E.: Closed form solutions for symmetric water filling games. In: Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM 2008), pp. 673\u2013681 (2008)","DOI":"10.1109\/INFOCOM.2008.117"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-00393-6_14","volume-title":"Network Control and Optimization","author":"E Altman","year":"2009","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112\u2013120. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Multiple Access Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23440-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:03:07Z","timestamp":1748577787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23440-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234397","9783319234403"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23440-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}