{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T09:56:56Z","timestamp":1648893416565},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T00:00:00Z","timestamp":1289520000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s11277-010-0171-9","type":"journal-article","created":{"date-parts":[[2010,11,10]],"date-time":"2010-11-10T23:40:02Z","timestamp":1289432402000},"page":"861-870","source":"Crossref","is-referenced-by-count":0,"title":["Remote Detection of a Frequency Jammer Operating in the Down Link of a Cellular System"],"prefix":"10.1007","volume":"63","author":[{"given":"Pablo M.","family":"Olmos","sequence":"first","affiliation":[]},{"given":"Juan Jos\u00e9","family":"Murillo-Fuentes","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Esteve","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,12]]},"reference":[{"key":"171_CR1","unstructured":"Stahlberg, M. (2000). Radio jamming attacks against two popular mobile networks. In Proceedings of the Helsinki University of Technology. Seminar on Network Security, Fall."},{"key":"171_CR2","unstructured":"Moscovitz, F. D. Y., Locatellin, M. (2005). Method and user equipment for jamming detection and signalling, Patent 2005, international Publication Number: WO 2005\/112321."},{"key":"171_CR3","doi-asserted-by":"crossref","unstructured":"Chan, G. N. A., Liu, X., Thapa, B. (2007). Control channel jamming: Resilience and identification of traitors. In Proceedings of the IEEE International Symposium on Information Theory, June 2007 (pp. 2496\u20132500).","DOI":"10.1109\/ISIT.2007.4557594"},{"key":"171_CR4","doi-asserted-by":"crossref","first-page":"1472","DOI":"10.1002\/wcm.855","volume":"9","author":"G. Yue","year":"2009","unstructured":"Yue G., Wang X. (2009) Efficient ARQ protocols with anti-jamming coding for cognitive radios. Wireless Communications and Mobile Computing 9: 1472\u20131486","journal-title":"Wireless Communications and Mobile Computing"},{"key":"171_CR5","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2008.4481339","volume":"46","author":"F. Akyildiz","year":"2008","unstructured":"Akyildiz F., Won-Yeol L., Vuran M., Mohanty S. (2008) A survey on spectrum management in cognitive radio networks. IEEE Communications Magazine 46: 40\u201348","journal-title":"IEEE Communications Magazine"},{"key":"171_CR6","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, 2005 (pp. 45\u201346).","DOI":"10.1145\/1062689.1062697"},{"key":"171_CR7","unstructured":"Jacobsen, E. (2002). Locating interfering devices in wireless networks using channel adaptation metrics, Patent, 2002, international Publication Number: WO 20051067249."},{"key":"171_CR8","doi-asserted-by":"crossref","unstructured":"Jian, Z., Hai, Z. (2009). A link quality evaluation model in wireless sensor networks. In Sensor Technologies and Applications, 2009. SENSORCOMM \u201909. Third International Conference on, June 2009 (pp. 1\u20135).","DOI":"10.1109\/SENSORCOMM.2009.8"},{"key":"171_CR9","doi-asserted-by":"crossref","unstructured":"Jiu-qiang, X., Pei-gang, S., Hai, Z., Xi-yuan, Z., Jian, Z., Da-wei, C. (2007). An analytical model for link evaluation of wireless sensor networks. In Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on, September 2007 (pp. 386\u2013391)","DOI":"10.1109\/NPC.2007.150"},{"key":"171_CR10","unstructured":"3GPP TS 05.08, Digital cellular telecommunications system (phase 2+): Radio subsystem link control, ETSI TS 100 911."},{"key":"171_CR11","doi-asserted-by":"crossref","unstructured":"Raitola, M., Ranta, P. (1996). Comparison of diversity combining techniques for GSM. In Proceedings IEEE Global Telecommunications Conference. GLOBECOM, vol. 3. November 1996 (pp. 1820\u20131824).","DOI":"10.1109\/GLOCOM.1996.591952"},{"key":"171_CR12","doi-asserted-by":"crossref","unstructured":"Chiani, M. (1996). Performance of BPSK and GMSK with multiple cochannel interferers. In Proceedings Seventh IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC\u201996, vol. 3. October 1996 (pp. 833\u2013837).","DOI":"10.1109\/PIMRC.1996.568398"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-010-0171-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-010-0171-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-010-0171-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T05:32:52Z","timestamp":1559799172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-010-0171-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,12]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["171"],"URL":"https:\/\/doi.org\/10.1007\/s11277-010-0171-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,12]]}}}