{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:55:31Z","timestamp":1775109331054,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642342653","type":"print"},{"value":"9783642342660","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34266-0_10","type":"book-chapter","created":{"date-parts":[[2012,11,4]],"date-time":"2012-11-04T23:49:04Z","timestamp":1352072944000},"page":"171-185","source":"Crossref","is-referenced-by-count":30,"title":["Deceptive Routing in Relay Networks"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Clark","sequence":"first","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Ba\u015far","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ba\u015far, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol.\u00a023. Society for Industrial and Applied Mathematics (SIAM) (1999)","DOI":"10.1137\/1.9781611971132"},{"key":"10_CR2","unstructured":"Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE International Multi-Topic Conference, INMIC (2001)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential dsss: Jamming-resistant wireless broadcast communication. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Noubir, G., Rajaraman, R., Sheng, B., Thapa, B.: On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In: Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec), pp. 97\u2013108. ACM (2011)","DOI":"10.1145\/1998412.1998430"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K. Pelechrinis","year":"2011","unstructured":"Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.: Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials\u00a013(2), 245\u2013257 (2011)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"10_CR7","unstructured":"Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publishers (2011)"},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/JSAC.2010.100608","volume":"28","author":"C. P\u00f6pper","year":"2010","unstructured":"P\u00f6pper, C., Strasser, M., \u010capkun, S.: Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications (JSAC)\u00a028(5), 703\u2013715 (2010)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Ross, S.: Introduction to Probability Models. Academic Press (2009)","DOI":"10.1016\/B978-0-12-375686-2.00007-8"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TNET.2010.2057515","volume":"19","author":"P. Tague","year":"2011","unstructured":"Tague, P., Nabar, S., Ritcey, J., Poovendran, R.: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE\/ACM Transactions on Networking\u00a019(1), 184\u2013194 (2011)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Tague, P., Slater, D., Poovendran, R., Noubir, G.: Linear programming models for jamming attacks on network traffic flows. In: Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp. 207\u2013216. IEEE (2008)","DOI":"10.4108\/ICST.WIOPT2008.3170"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE), pp. 80\u201389. ACM (2004)","DOI":"10.1145\/1023646.1023661"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Clark, A., Poovendran, R., Ba\u015far, T.: Deceptive routing games. To appear in Proceedings of IEEE Conference on Decision and Control (CDC), Maui, Hawaii (2012)","DOI":"10.1109\/CDC.2012.6426515"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34266-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:49:43Z","timestamp":1620132583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34266-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342653","9783642342660"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34266-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}