{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:37:16Z","timestamp":1725601036653},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642234897"},{"type":"electronic","value":"9783642234903"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23490-3_26","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:35:19Z","timestamp":1313584519000},"page":"280-291","source":"Crossref","is-referenced-by-count":0,"title":["Jamming-Resistant Communication in Multi-Channel Multi-hop Multi-path Wireless Networks"],"prefix":"10.1007","author":[{"given":"Hai","family":"Su","sequence":"first","affiliation":[]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Strasser, M., P\u00f6pper, C., Capkun, S., Cagalj, M.: Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proc. of IEEE Symposium on Security and Privacy (May 2008)","DOI":"10.1109\/SP.2008.9"},{"key":"26_CR2","unstructured":"Wang, Q., Xu, P., Ren, K., yang Li, X.: Delay-bounded adaptive ufh-based anti-jamming wireless communication. In: Proc. of IEEE INFOCOM (2011)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Su, H., Wang, Q., Ren, K., Xing, K.: Jamming-resilient dynamic spectrum access for cognitive radio networks. In: Proc. of IEEE ICC (2011)","DOI":"10.1109\/icc.2011.5962525"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1145\/1236360.1236423","volume-title":"IPSN","author":"W. Xu","year":"2007","unstructured":"Xu, W., Trappe, W., Zhang, Y.: Channel surfing: defending wireless sensor networks from interference. In: IPSN, pp. 499\u2013508. ACM, New York (2007)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Richa, A.W., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. CoRR, vol. abs\/1007.1189 (2010)","DOI":"10.1007\/978-3-642-15763-9_17"},{"issue":"10","key":"26_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TNET.2010.2057515","volume":"19","author":"P. Tague","year":"2011","unstructured":"Tague, P., Nabar, S., Ritcey, J.A., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE\/ACM Transactions on Networking\u00a019, 184\u2013194 (2011)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"26_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.jnca.2010.03.022","volume":"34","author":"S. Jiang","year":"2011","unstructured":"Jiang, S., Xue, Y.: Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. Journal of Network and Computer Applications\u00a034(2), 443\u2013454 (2011)","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"26_CR9","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P. Gupta","year":"2000","unstructured":"Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Transactions on Information Theory\u00a046(2), 388\u2013404 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Kodialam, M.S., Nandagopal, T.: Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In: Proc. of IEEE MOBICOM (2005)","DOI":"10.1145\/1080829.1080837"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P. Auer","year":"2003","unstructured":"Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: The nonstochastic multiarmed bandit problem. SIAM J. Comput.\u00a032, 48\u201377 (2003)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23490-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T03:53:46Z","timestamp":1560484426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23490-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642234897","9783642234903"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23490-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}