{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T20:07:48Z","timestamp":1772136468003,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T00:00:00Z","timestamp":1419984000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11235-014-9930-3","type":"journal-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:17:33Z","timestamp":1419977853000},"page":"159-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Defending jamming attack in wide-area monitoring system for smart grid"],"prefix":"10.1007","volume":"60","author":[{"given":"Jianwei","family":"Niu","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Su","sequence":"additional","affiliation":[]},{"given":"Zonghua","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,31]]},"reference":[{"key":"9930_CR1","doi-asserted-by":"crossref","unstructured":"Ranganathan, R., Qiu, R., Hu, Z., Hou, S., Pazos-Revilla, M., Zheng, G., et al. (2011). Cognitive radio for smart grid: Theory, algorithms, and security. International Journal of Digital Multimedia Broadcasting, 1\u201314.","DOI":"10.1155\/2011\/502087"},{"key":"9930_CR2","doi-asserted-by":"crossref","unstructured":"Qiu, M., & Sha, E. H. M. (2009). Cost minimization while satisfying hard\/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic Systems (TODAES), 14(2), 1\u201330 Mar 2009. ACM TODAES 2011 Best Paper Award.","DOI":"10.1145\/1497561.1497568"},{"issue":"4","key":"9930_CR3","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1109\/TSG.2011.2160298","volume":"2","author":"M Qiu","year":"2011","unstructured":"Qiu, M., Gao, W., Chen, M., Niu, J., & Zhang, L. (2011). Energy efficient security algorithm for power grid wide area monitoring systems. IEEE Transactions on Smart Grid, 2(4), 715\u2013723.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"8","key":"9930_CR4","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MCOM.2012.6257528","volume":"50","author":"H Su","year":"2012","unstructured":"Su, H., Qiu, M., & Wang, H. (2012). Secure wireless communication system for smart grid with rechargeable electric vehicles. IEEE Communication Magazine, 50(8), 62\u201368.","journal-title":"IEEE Communication Magazine"},{"key":"9930_CR5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11235-009-9224-3","volume":"44","author":"T Ali-Yahiya","year":"2010","unstructured":"Ali-Yahiya, T., Beylot, A. L., & Pujolle, G. (2010). Downlink resource allocation strategies for OFDMA based mobile WiMAX. Telecommunication Systems, 44, 29\u201337.","journal-title":"Telecommunication Systems"},{"issue":"3","key":"9930_CR6","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/JSAC.2010.100412","volume":"28","author":"L Zhou","year":"2010","unstructured":"Zhou, L., Wang, X., Tu, W., Mutean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409\u2013419.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"7","key":"9930_CR7","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou, L., Chao, H.-C., & Vasilakos, A. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358\u20131367.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"9930_CR8","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1109\/TMM.2011.2160716","volume":"13","author":"L Zhou","year":"2011","unstructured":"Zhou, L., & Chen, H.-H. (2011). On multimedia scheduling with constrained control channels. IEEE Transactions on Multimedia, 13(5), 1040\u20131051.","journal-title":"IEEE Transactions on Multimedia"},{"key":"9930_CR9","doi-asserted-by":"crossref","unstructured":"Ghassemi, A., Bavarian, S., & Lampe, L. (2010). Cognitive radio for smart grid communications. Proc. of Smart Grid Communications (SmartGridComm) (pp. 297\u2013302), Oct. 2010.","DOI":"10.1109\/SMARTGRID.2010.5622097"},{"key":"9930_CR10","unstructured":"Edison Electric Institute (2008). Renewable energy: Growth and challenges in the electric industry. Edison Electric Institute Technique Report, 2008."},{"key":"9930_CR11","unstructured":"Office of the National Coordinator for Smart Grid Interoperability (2010). NIST framework and roadmap for smart grid interoperability standards, Release 1.0, Jan 2010."},{"key":"9930_CR12","doi-asserted-by":"crossref","unstructured":"Javidi, T., Krishnamachari, B., Zhao, Q., & Liu, M. (2008). Optimality of myopic sensing in multi-channel opportunistic access. Proc. of International Conference on Communication (pp. 2107\u20132112).","DOI":"10.1109\/ICC.2008.404"},{"issue":"12\u20132","key":"9930_CR13","doi-asserted-by":"crossref","first-page":"5431","DOI":"10.1109\/T-WC.2008.071349","volume":"7","author":"Q Zhao","year":"2008","unstructured":"Zhao, Q., Krishnamachari, B., & Liu, K. (2008). On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. IEEE Transactions on Wireless Communications, 7(12\u20132), 5431\u20135440.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"9930_CR14","unstructured":"Ahmad, S. H. A., Liu, M., Javidi, T., Zhao, Q., & Krishnamachari, B. (2008). Optimality of myopic sensing in multi-channel opportunistic access. CoRR (vol. abs\/0811.0637)."},{"key":"9930_CR15","doi-asserted-by":"crossref","unstructured":"Ghosh, B. (2009). How vulnerable is the power grid? TIME, Apr 2009.","DOI":"10.1063\/pt.5.023087"},{"key":"9930_CR16","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Proc. of IEEE INFOCOM (Vol. 3, pp. 1976\u20131986).","DOI":"10.1109\/INFCOM.2003.1209219"},{"issue":"2","key":"9930_CR17","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/JSAC.2005.861392","volume":"24","author":"P Papadimitratos","year":"2006","unstructured":"Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343\u2013356.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9930_CR18","unstructured":"Humphreys, T. E., Kintner, P. M., Psiaki, M. L., Ledvina, B., & O\u2019 Hanlon, B. (2009). Assessing the spoofing threat. http:\/\/www.gpsworld.com\/defense\/security-surveillance\/assessing-spoofing-threat-3171"},{"key":"9930_CR19","doi-asserted-by":"crossref","unstructured":"Strasser, M., P\u00f6pper, C., Capkun, S., & Cagalj, M. (2008). Jamming-resistant key establishment using uncoordinated frequency hopping. Proc. of IEEE Symposium on Security and Privacy (pp. 64\u201378).","DOI":"10.1109\/SP.2008.9"},{"key":"9930_CR20","first-page":"2369","volume":"8","author":"A Gy\u00f6rgy","year":"2007","unstructured":"Gy\u00f6rgy, A., Linder, T., Lugosi, G., & Ottucs\u00e1k, G. (2007). The on-line shortest path problem under partial monitoring. Journal of Machine Learning Research, 8, 2369\u20132403.","journal-title":"Journal of Machine Learning Research"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9930-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-014-9930-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9930-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T17:53:23Z","timestamp":1747331603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-014-9930-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,31]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9930"],"URL":"https:\/\/doi.org\/10.1007\/s11235-014-9930-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,31]]}}}