{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T22:50:17Z","timestamp":1649199017649},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2012,9,30]],"date-time":"2012-09-30T00:00:00Z","timestamp":1348963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1007\/s11276-012-0502-8","type":"journal-article","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T01:42:32Z","timestamp":1349055752000},"page":"799-810","source":"Crossref","is-referenced-by-count":4,"title":["Detecting misbehavior in distributed wireless interference networks"],"prefix":"10.1007","volume":"19","author":[{"given":"Holger","family":"Boche","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siddharth","family":"Naik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eduard","family":"Jorswieck","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,9,30]]},"reference":[{"key":"502_CR1","doi-asserted-by":"crossref","unstructured":"Boche, H., Naik, S., & Alpcan, T. (2010). Characterization of non-manipulable and pareto optimal resource allocation strategies for interference coupled wireless systems. IEEE INFOCOM, San Diego, California, USA, March.","DOI":"10.1109\/INFCOM.2010.5462069"},{"key":"502_CR2","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., & Baras, J. (2008). Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications, 26, (7).","DOI":"10.1109\/JSAC.2008.080928"},{"key":"502_CR3","doi-asserted-by":"crossref","unstructured":"Sagduyu, Y. E. , Berry, R., & Ephremides, A.(2009). MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. GameNets.","DOI":"10.1109\/GAMENETS.2009.5137394"},{"key":"502_CR4","volume-title":"Security and cooperation in wireless networks","author":"L. Buttyan","year":"2008","unstructured":"Buttyan, L., Hubaux, J. -P. (2008). Security and cooperation in wireless networks. Cambridge: Cambridge University Press."},{"key":"502_CR5","doi-asserted-by":"crossref","unstructured":"Shen, F., Jorswieck, E. (2012). Universal cheatproof pricing for multiple access channels without SIC under QoS requirements. IEEE Internation Conference on Communications (ICC), 2012, accepted.","DOI":"10.1109\/ICC.2012.6364573"},{"key":"502_CR6","volume-title":"Human action: A treatise on economics","author":"L.V. Mises","year":"1963","unstructured":"Mises, L.V. (1963). Human action: A treatise on economics. Yale: Yale University Press.","edition":"4"},{"key":"502_CR7","unstructured":"Chorppath, A. K., & Alpcan, T. (2011). Adversarial behavior in network mechanism design. Proceedings of GameComm."},{"key":"502_CR8","volume-title":"Network security: A decision and game theoretic approach","author":"T Alpcan","year":"2011","unstructured":"Alpcan, T., & Baser, T. (2011). Network security: A decision and game theoretic approach. Cambridge: Cambridge University Press."},{"key":"502_CR9","doi-asserted-by":"crossref","unstructured":"Foschini, G.J., & Miljanic, Z. (1993). A simple distributed power control algorithm and its convergence. IEEE Transactions on Vehicular Technology, 641\u2013646.","DOI":"10.1109\/25.260747"},{"key":"502_CR10","doi-asserted-by":"crossref","unstructured":"Verdu, S., & Poor, H. (1983). Minimax robust discrete-time matched filters. IEEE Transactions on Communications.","DOI":"10.1109\/TCOM.1983.1095790"},{"issue":"7","key":"502_CR11","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1109\/49.414651","volume":"13","author":"R. D. Yates","year":"1995","unstructured":"Yates, R. D. (1995). A framework for uplink power control in cellular radio systems. IEEE Journal on Selected Areas in Communication, 13 (7), 1341\u20131348.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"502_CR12","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1023\/A:1019156106722","volume":"4","author":"C. Huang","year":"1998","unstructured":"Huang, C., & Yates, R. (1998). Rate of convergence for minimum power assignment algorithms in cellular radio systems. Baltzer\/ACM Wireless Networks 4, 223\u2013231.","journal-title":"Baltzer\/ACM Wireless Networks"},{"issue":"9","key":"502_CR13","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TCOMM.2004.833140","volume":"52","author":"K.K Leung","year":"2004","unstructured":"Leung, K.K, Sung, C.W., Wong, W.S., & Lok, T. (2004). Convergence theorem for a general class of power-control algorithms. IEEE Transactions on Communications 52 (9), 1566-1574.","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"502_CR14","doi-asserted-by":"crossref","first-page":"3282","DOI":"10.1109\/TSP.2010.2045415","volume":"58","author":"H. Boche","year":"2010","unstructured":"Boche, H., & Schubert, M. (2010). A unifying approach to interference modeling for wireless networks. IEEE Transactions on Signal Processing 58 (6), 3282\u20133297.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"5","key":"502_CR15","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/90.879345","volume":"8","author":"N. Bambos","year":"2000","unstructured":"Bambos, N., Chen, S., & Pottie, G. (2000). Channel access algorithms with active link protection for wireless communication networks with power control. IEEE\/ACM Transactions on Networking 8(5), 583\u2013597.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"6","key":"502_CR16","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1023\/A:1019101700730","volume":"4","author":"S. Ulukus","year":"1998","unstructured":"Ulukus, S., & Yates, R. (1998). Adaptive power control and MMSE interference suppression. ACM Wireless Networks 4(6), 489\u2013496.","journal-title":"ACM Wireless Networks"},{"key":"502_CR17","doi-asserted-by":"crossref","unstructured":"Stanczak, S., Wiczanowski, M., & Boche, H. (2006). Resource allocation in wireless networks\u2014theory and algorithmsseries Lecture Notes in Computer Science (LNCS 4000). Berlin: Springer.","DOI":"10.1007\/11818762"},{"key":"502_CR18","doi-asserted-by":"crossref","unstructured":"Schubert, M., & Boche, H. (2005\/2006) QoS-based resource allocation and transceiver optimization Foundations and Trends on Communications and Information Theory 2 (6), 383\u2013529.","DOI":"10.1561\/0100000010"},{"key":"502_CR19","doi-asserted-by":"crossref","unstructured":"Boche, H., Naik, S., & Schubert, M. (2011). Combinatorial characterization of interference coupling in wireless systems. IEEE Transactions on Communications 59(6).","DOI":"10.1109\/TCOMM.2011.050911.090072A"},{"key":"502_CR20","unstructured":"Brualdi, R. A. (1989). Matrix theory and applications. AMS short course lecture notes, The many facets of combinatorial matrix theory, pp. 1\u201336."},{"key":"502_CR21","doi-asserted-by":"crossref","unstructured":"Boche, H., & Schubert, M. (2008). Concave and convex interference functions\u2014general characterization with application. IEEE Transactions on Signal Processing, 56 (10).","DOI":"10.1109\/TSP.2008.928093"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-012-0502-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-012-0502-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-012-0502-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T09:30:15Z","timestamp":1562232615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-012-0502-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,30]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["502"],"URL":"https:\/\/doi.org\/10.1007\/s11276-012-0502-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,30]]}}}