{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:35:07Z","timestamp":1725777307637},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/allerton.2016.7852317","type":"proceedings-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T21:38:11Z","timestamp":1487021891000},"page":"816-821","source":"Crossref","is-referenced-by-count":6,"title":["Game theoretic defense approach to wireless networks against stealthy decoy attacks"],"prefix":"10.1109","author":[{"given":"Ahmed H.","family":"Anwar","sequence":"first","affiliation":[]},{"given":"George","family":"Atia","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.300"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref12","article-title":"Distributed dynamic channel selection in chaotic wireless networks","author":"ihmig","year":"2007","journal-title":"13th European Wireless Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.165"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514299"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451072"},{"key":"ref16","first-page":"1","article-title":"Optimal power allocation strategy against jamming attacks using the colonel blotto game","author":"wu","year":"2009","journal-title":"IEEE Global Telecommunications Conference (GLOBECOM)"},{"key":"ref17","article-title":"From physical security to cyber security","author":"sinha","year":"0","journal-title":"J of Cybersecurity 2015"},{"key":"ref18","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","author":"kiekintveld","year":"2009","journal-title":"Proc of The 8th Int Conf on Autonomous Agents and Multiagent Systems-Volume 1"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7611","article-title":"Se-curity games with arbitrary schedules: A branch and price approach","author":"jain","year":"2010","journal-title":"Proceedings of AAAI"},{"journal-title":"Cisco","article-title":"Radio resource management white paper: Chapter: Transmit power control (tpc) algorithm","year":"2016","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032511.00097"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510986"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962522"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"journal-title":"Cisco","article-title":"Cisco visual networking index: Global mobile data traffic forecast update, 20152020 white paper","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357521"},{"key":"ref20","first-page":"327","article-title":"A double oracle algorithm for zero-sum security games on graphs","author":"jain","year":"2011","journal-title":"The 10th Int Conf on Autonomous Agents and Multiagent Systems-Volume 1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523807"},{"key":"ref24","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"2013","journal-title":"USENIX Symp on Networked Systems Design and Implementation (NSDI)"},{"journal-title":"Marktform und Gleichgewicht","year":"1934","author":"von stackelberg","key":"ref23"}],"event":{"name":"2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2016,9,27]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2016,9,30]]}},"container-title":["2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819723\/7852197\/07852317.pdf?arnumber=7852317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T13:02:13Z","timestamp":1719061333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7852317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/allerton.2016.7852317","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}