{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:23:36Z","timestamp":1743092616118,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642303722"},{"type":"electronic","value":"9783642303739"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30373-9_30","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T00:14:47Z","timestamp":1338336887000},"page":"429-443","source":"Crossref","is-referenced-by-count":18,"title":["Jamming Game in a Dynamic Slotted ALOHA Network"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[]},{"given":"Yezekael","family":"Hayel","sequence":"additional","affiliation":[]},{"given":"Eitan","family":"Altman","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Avrachenkov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","volume-title":"Game Theory","author":"G. Owen","year":"1982","unstructured":"Owen, G.: Game Theory. W.B.Sanders, Philadelphia (1982)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Zander, J.: Jamming in Slotted ALOHA Multihop Packet Radio Networks. IEEE Trans. on Comm.\u00a039(10) (1991)","DOI":"10.1109\/26.103048"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Ma, R., Misra, V., Rubenstein, D.: An Analysis of Generalized Slotted-Aloha Protocols. IEEE\/ACM Trans. on Networking\u00a017(3) (2009)","DOI":"10.1109\/TNET.2008.925633"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Abramson, N.: The Aloha-system-another alternative for computer communications. In: AFIPS Conf. Proc., vol.\u00a036, pp. 295\u2013298 (1970)","DOI":"10.21236\/AD0707853"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Roberts, L.: Aloha Packet System with and without slots and capture. ACM SIGCOMM Comput. Comm. Rev.\u00a05(2) (1975)","DOI":"10.1145\/1024916.1024920"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Jin, Y., Kesidis, G.: Equilibria of a Noncooperative Game for Heterogeneous Users of an ALOHA Network. IEEE Communications Letters\u00a06(7) (2002)","DOI":"10.1109\/LCOMM.2002.801326"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Altman, E., ELAzouzi, R., Jimenez, T.: Slotted Aloha as a game with partial information. Computer Networks\u00a045(6) (2004)","DOI":"10.1016\/j.comnet.2004.02.013"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Menache, I., Shimkin, N.: Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information. In: Proc. of INFOCOM 2008 (2008)","DOI":"10.1109\/INFOCOM.2008.87"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-540-72709-5_3","volume-title":"Network Control and Optimization","author":"I. Menache","year":"2007","unstructured":"Menache, I., Shimkin, N.: Fixed-Rate Equilibrium in Wireless Collision Channels. In: Chahed, T., Tuffin, B. (eds.) NET-COOP 2007. LNCS, vol.\u00a04465, pp. 23\u201332. Springer, Heidelberg (2007)"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s11276-007-0088-8","volume":"15","author":"Y.E. Sagduyu","year":"2009","unstructured":"Sagduyu, Y.E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. Journal of Wireless Networks\u00a015, 651\u2013666 (2009)","journal-title":"Journal of Wireless Networks"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Xu, X., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proc. MobiHoc 2005, Urbana-Champaign, IL (May 2005)","DOI":"10.1145\/1062689.1062697"},{"key":"30_CR12","unstructured":"Sagduyu, Y.E., Berry, R.A., Ephremides, A.: Wireless Jamming Attacks under Dynamic Traffic Uncertainty. In: Proc. of WiOpt 2010 (2010)"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Sagduyu, Y.E., Berry, R.A., Ephremides, A.: Jamming Games for Power Controlled Medium Access with Dynamic Traffic. In: Proc. of ISIT 2010 (2010)","DOI":"10.1109\/ISIT.2010.5513413"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72709-5_1","volume-title":"Network Control and Optimization","author":"E. Altman","year":"2007","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: A Jamming Game in Wireless Networks with Transmission Cost. In: Chahed, T., Tuffin, B. (eds.) NET-COOP 2007. LNCS, vol.\u00a04465, pp. 1\u201312. Springer, Heidelberg (2007)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Altman, E., Avratchenkov, K., Garnaev, A.: Jamming Game with Incomplete Information about the Jammer. In: Proc. of GameComm 2009 (2009)","DOI":"10.4108\/ICST.VALUETOOLS2009.8044"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A Game Theoretic Analysis of Intrusion Detection in Access Control Systems. In: Proc. of IEEE Conference on Decision and Control, Paradise Island, Bahamas (2004)","DOI":"10.1109\/CDC.2004.1430267"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Altman, E., Hordijk, A.: Zero-sum Markov games and worst-case optimal control of queueing systems. QUESTA\u00a021, 415\u2013447 (1995), Special issue on optimization of queueing systems","DOI":"10.1007\/BF01149169"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proc. of SIGCOMM 2003, pp. 27\u201334 (2003)","DOI":"10.1145\/863955.863960"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and the consequences of human mobility in conference environments. In: Proceedings of ACM SIGCOMM First Workshop on Delay Tolerant Networking and Related Topics (2005)","DOI":"10.1145\/1080139.1080142"},{"issue":"4","key":"30_CR20","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TNET.2002.801403","volume":"10","author":"M. Grossglauser","year":"2002","unstructured":"Grossglauser, M., Tse, D.N.C.: Mobility increases the capacity of ad hoc wireless networks. IEEE\/ACM Trans. Netw.\u00a010(4), 477\u2013486 (2002)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: Proc. of INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.144"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30373-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:49:26Z","timestamp":1556819366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30373-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642303722","9783642303739"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30373-9_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}