{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:07:19Z","timestamp":1725739639466},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397004"},{"type":"electronic","value":"9783642397011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39701-1_36","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T14:19:31Z","timestamp":1372947571000},"page":"440-453","source":"Crossref","is-referenced-by-count":3,"title":["Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming"],"prefix":"10.1007","author":[{"given":"Yantian","family":"Hou","sequence":"first","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Atia, G., Sahai, A., Saligrama, V.: Spectrum enforcement and liability assignment in cognitive radio systems. In: Proceedings of the 3rd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago IL (2008)","key":"36_CR1","DOI":"10.1109\/DYSPAN.2008.53"},{"issue":"3","key":"36_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1109\/11.969370","volume":"47","author":"O. Bendov","year":"2001","unstructured":"Bendov, O., Browne, J., Rhodes, C., Wu, Y., Bouchard, P.: Dtv coverage and service prediction, measurement and performance indices. IEEE Transactions on Broadcasting\u00a047(3), 207\u2013217 (2001)","journal-title":"IEEE Transactions on Broadcasting"},{"unstructured":"Dong, L., Han, Z., Petropulu, A., Poor, H.: Cooperative jamming for wireless physical layer security. In: IEEE\/SP 15th Workshop on Statistical Signal Processing, SSP 2009, pp. 417\u2013420 (2009)","key":"36_CR3"},{"issue":"3","key":"36_CR4","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L. Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A., Poor, H.: Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing\u00a058(3), 1875\u20131888 (2010)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"36_CR5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1145\/2018436.2018456","volume-title":"Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM 2011","author":"S. Gollakota","year":"2011","unstructured":"Gollakota, S., Adib, F., Katabi, D., Seshan, S.: Clearing the rf smog: making 802.11n robust to cross-technology interference. In: Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM 2011, pp. 170\u2013181. ACM, New York (2011)"},{"issue":"12","key":"36_CR6","doi-asserted-by":"publisher","first-page":"5500","DOI":"10.1109\/TIT.2008.2006376","volume":"54","author":"M. Haenggi","year":"2008","unstructured":"Haenggi, M.: A geometric interpretation of fading in wireless networks: Theory and applications. IEEE Transactions on Information Theory\u00a054(12), 5500\u20135510 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1530748.1530751","volume-title":"Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009","author":"J. Jia","year":"2009","unstructured":"Jia, J., Zhang, Q., Zhang, Q., Liu, M.: Revenue generation for truthful spectrum auction in dynamic spectrum access. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, pp. 3\u201312. ACM, New York (2009)"},{"key":"36_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1530748.1530752","volume-title":"Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009","author":"G.S. Kasbekar","year":"2009","unstructured":"Kasbekar, G.S., Sarkar, S.: Spectrum auction framework for access allocation in cognitive radio networks. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, pp. 13\u201322. ACM, New York (2009)"},{"unstructured":"Kelif, J.M., Coupechoux, M.: Joint impact of pathloss shadowing and fast fading - an outage formula for wireless networks. CoRR, abs\/1001.1110 (2010)","key":"36_CR9"},{"doi-asserted-by":"crossref","unstructured":"Liu, S., Greenstein, L.J., Trappe, W., Chen, Y.: Detecting anomalous spectrum usage in dynamic spectrum access networks. Ad Hoc Networks??10(5), 831???844 (2012);","key":"#cr-split#-36_CR10.1","DOI":"10.1016\/j.adhoc.2011.04.003"},{"unstructured":"Special Issue on Cognitive Radio Ad Hoc Networks","key":"#cr-split#-36_CR10.2"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H.: Authenticating primary users\u2019 signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 286\u2013301 (2010)","key":"36_CR11","DOI":"10.1109\/SP.2010.24"},{"doi-asserted-by":"crossref","unstructured":"Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, vol.\u00a03, pp. 1906\u20131910 (2005)","key":"36_CR12","DOI":"10.1109\/VETECF.2005.1558439"},{"unstructured":"Proakis, J., Salehi, M.: Digital communications. McGraw-Hill Higher Education (2008)","key":"36_CR13"},{"key":"36_CR14","volume-title":"Wireless Communications: Principles and Practice","author":"T.S. Rappaport","year":"1996","unstructured":"Rappaport, T.S.: Wireless Communications: Principles and Practice, 1st edn. IEEE Press, Piscataway (1996)","edition":"1"},{"issue":"3","key":"36_CR15","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.2009.4804393","volume":"47","author":"A. Sahai","year":"2009","unstructured":"Sahai, A., Woyach, K.A., Atia, G., Saligrama, V.: A technical framework for light-handed regulation of cognitive radios. Comm. Mag.\u00a047(3), 96\u2013102 (2009)","journal-title":"Comm. Mag."},{"key":"36_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2462096.2462103","volume-title":"Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013","author":"T.D. Vo-Huu","year":"2013","unstructured":"Vo-Huu, T.D., Blass, E.-O., Noubir, G.: Counter-jamming using mixed mechanical and software interference cancellation. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 31\u201342. ACM, New York (2013)"},{"doi-asserted-by":"crossref","unstructured":"Shen, W., Ning, P., He, X., Dai, H.: Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013. IEEE Computer Society (2013)","key":"36_CR17","DOI":"10.1109\/SP.2013.22"},{"doi-asserted-by":"crossref","unstructured":"Li, B., Feng, X., Zhang, Q.: Enabling co-channel coexistence of 802.22 and 802.11af systems in tv white spaces. In: 2013 IEEE International Conference on Communications (ICC) (2013)","key":"36_CR18","DOI":"10.1109\/ICC.2013.6655567"},{"key":"36_CR19","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/2248371.2248400","volume-title":"Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2012","author":"L. Yang","year":"2012","unstructured":"Yang, L., Zhang, Z., Zhao, B.Y., Kruegel, C., Zheng, H.: Enforcing dynamic spectrum access with spectrum permits. In: Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2012, pp. 195\u2013204. ACM, New York (2012)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39701-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T10:42:29Z","timestamp":1645958549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39701-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397004","9783642397011"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39701-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}