{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:05:06Z","timestamp":1761581106643},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/ciss.2013.6552328","type":"proceedings-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T16:26:57Z","timestamp":1373560017000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Optimal strategies in jamming resistant uncoordinated frequency hopping systems"],"prefix":"10.1109","author":[{"family":"Bingwen Zhang","sequence":"first","affiliation":[]},{"family":"Lifeng Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165948"},{"key":"2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/1998412.1998422","article-title":"Reactive jamming in wireless networks-how realistic is the threat?","author":"wihelm","year":"2011","journal-title":"Proceedings of the first ACM conference on Wireless network security"},{"key":"1","first-page":"64","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser popper","year":"2008","journal-title":"Proc IEEE IntI Symposium on Security and Privacy"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100629"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120103"}],"event":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS 2013)","start":{"date-parts":[[2013,3,20]]},"location":"Baltimore, MD","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 47th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6542220\/6552191\/06552328.pdf?arnumber=6552328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T22:01:21Z","timestamp":1563400881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6552328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/ciss.2013.6552328","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}