{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:38:04Z","timestamp":1759639084870,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5198912","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-6","source":"Crossref","is-referenced-by-count":34,"title":["Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution"],"prefix":"10.1109","author":[{"given":"A.","family":"Hamieh","sequence":"first","affiliation":[]},{"given":"J.","family":"Ben-Othman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209181"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023661"},{"key":"2","first-page":"2930","article-title":"low-power dos attacks in data wireless lans and countermeasures. sigmobile mob","volume":"7","author":"noubir","year":"2003","journal-title":"Comput Commun Rev"},{"key":"1","article-title":"intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks","author":"acharya","year":"2005","journal-title":"Proceedings of the OPNETWORK-2005 Conference"},{"year":"0","key":"10"},{"journal-title":"Analyse de re?gression applique?","year":"2004","author":"dodge","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"4","article-title":"deejam: defeating energy-efficient jamming in ieee 802.15.4-based wireless networks","author":"anthony","year":"2007","journal-title":"IEEE Conference on Sensor Ad Hoc Communications and Networks"},{"key":"9","article-title":"denial of service resilience in ad hoc networks","author":"aad","year":"2004","journal-title":"Proceedings of MOBICOM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2003.1253275"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05198912.pdf?arnumber=5198912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T04:44:27Z","timestamp":1489812267000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5198912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5198912","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}