{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:07:21Z","timestamp":1730203641239,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T00:00:00Z","timestamp":1631404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T00:00:00Z","timestamp":1631404800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T00:00:00Z","timestamp":1631404800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,12]]},"DOI":"10.1109\/ccece53047.2021.9569143","type":"proceedings-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T21:13:38Z","timestamp":1635282818000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks"],"prefix":"10.1109","author":[{"given":"Eman","family":"Hammad","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Farraj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0855-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1207-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1423-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2010.11005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928904"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185512"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2905759"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862350"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"828","DOI":"10.3390\/s20030828","article-title":"5G support for Industrial IoT Applications-Challenges, Solutions, and Research gaps","volume":"20","author":"varga","year":"2020","journal-title":"SENSORS"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1109\/TSG.2015.2440095","article-title":"A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems","volume":"7","author":"farraj","year":"2015","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su13010338"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007772"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/j.matpr.2021.05.067","article-title":"A review paper on wireless sensor network techniques in Internet of Things (IoT)","author":"gulati","year":"2021","journal-title":"Materials Today Proceedings"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1073\/pnas.1618130114","article-title":"Wireless physical layer security","volume":"114","author":"poor","year":"0","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141126"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4055"},{"key":"ref8","article-title":"State Of Enterprise IoT Security In North America: Unmanaged And Unsecured","author":"larrivaud","year":"2019","journal-title":"A Forrester Consulting Thought Leadership Paper Commissioned By Armis Inc"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900716"},{"journal-title":"Internet of things (iot) connected devices installed base worldwide from 2015 to 2025","year":"2016","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF49715.2020.9221122"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2466548"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2961659"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1331-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0722-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0606-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0469-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1206569109"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162606"}],"event":{"name":"2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2021,9,12]]},"location":"ON, Canada","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9569025\/9569028\/09569143.pdf?arnumber=9569143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:07Z","timestamp":1652201647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9569143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ccece53047.2021.9569143","relation":{},"subject":[],"published":{"date-parts":[[2021,9,12]]}}}