{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T07:56:25Z","timestamp":1725436585416},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946837","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:25:48Z","timestamp":1497979548000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Nash equilibria of deception strategies in the IEEE 802.22 cognitive radio networks"],"prefix":"10.1109","author":[{"given":"Ismail K.","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Abraham O.","family":"Fapojuwo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523510"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/0112033"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICM2CS.2009.5397970"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.9.4.859-866"},{"journal-title":"Potential Denial of Service Threat Assessment for Cognitive Radios","year":"0","author":"sethi","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7084371"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2430865"},{"key":"ref5","article-title":"Security and the protocol reference model enhancements in IEEE 802.22","author":"mody","year":"0","journal-title":"IEEE doc 802 22-08\/0083r4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5380058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/8.99049"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2008.32"},{"journal-title":"Tech Rep","article-title":"Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies","year":"0","key":"ref1"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2017,4,30]]},"location":"Windsor, ON","end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946837.pdf?arnumber=7946837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T17:22:26Z","timestamp":1525368146000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946837","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}