{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:47:37Z","timestamp":1729662457332,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/globalsip.2013.6737120","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T22:45:12Z","timestamp":1392331512000},"page":"1190-1193","source":"Crossref","is-referenced-by-count":2,"title":["Spoofing optimization over Nakagami-m fading channels of a cognitive radio adversary"],"prefix":"10.1109","author":[{"given":"Madushanka","family":"Soysa","sequence":"first","affiliation":[]},{"given":"Pamela C.","family":"Cosman","sequence":"additional","affiliation":[]},{"given":"Laurence B.","family":"Milstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Spoofing and jamming optimization over rayleigh fading channels of a cognitive radio adversary","author":"soysa","year":"0","journal-title":"Submitted to IEEE Trans Commun"},{"journal-title":"Digital Communication over Fading Channels ser","year":"2005","author":"simon","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1967.5573"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043966"},{"key":"2","first-page":"456","article-title":"Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment","author":"brown","year":"2007","journal-title":"International Conference on Cognitive Radio Oriented Wireless Networks and Communications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314233"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100629"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2008.16"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110420"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2010.5601409"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.071812.100729"},{"key":"8","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TWC.2010.112310.100630","article-title":"Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part ii: Unknown channel statistics","volume":"10","author":"li","year":"2011","journal-title":"IEEE Trans Wireless Commun"}],"event":{"name":"2013 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","start":{"date-parts":[[2013,12,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2013,12,5]]}},"container-title":["2013 IEEE Global Conference on Signal and Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6728802\/6736786\/06737120.pdf?arnumber=6737120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:51:32Z","timestamp":1498117892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6737120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/globalsip.2013.6737120","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}