{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T03:15:15Z","timestamp":1768274115970,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS 2125222"],"award-info":[{"award-number":["ECCS 2125222"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1109\/host54066.2022.9840209","type":"proceedings-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T20:53:39Z","timestamp":1660078419000},"page":"49-52","source":"Crossref","is-referenced-by-count":8,"title":["Detecting Continuous Jamming Attack using Ultra-low Power RSSI Circuit"],"prefix":"10.1109","author":[{"given":"Ankit","family":"Mittal","sequence":"first","affiliation":[{"name":"Northeastern University,Dept. of Electrical and Computer Engg.,Boston,USA"}]},{"given":"Aatmesh","family":"Shrivastava","sequence":"additional","affiliation":[{"name":"Northeastern University,Dept. of Electrical and Computer Engg.,Boston,USA"}]}],"member":"263","reference":[{"key":"ref4","first-page":"46","author":"xu","year":"2005","journal-title":"The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795499"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974514"},{"key":"ref6","first-page":"197","volume":"17","author":"grover","year":"2014","journal-title":"Jamming and Anti-jamming Techniques in Wireless Networks A Survey"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351563"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2013.6658500"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2005.848023"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: attack and defense strategies","volume":"20","author":"xu","year":"2006","journal-title":"IEEE Network"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911424"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2016.2519030"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.921621"}],"event":{"name":"2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"McLean, VA, USA","start":{"date-parts":[[2022,6,27]]},"end":{"date-parts":[[2022,6,30]]}},"container-title":["2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9839666\/9839669\/09840209.pdf?arnumber=9840209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:52:57Z","timestamp":1661809977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9840209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/host54066.2022.9840209","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]}}}