{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:13:31Z","timestamp":1725772411308},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icca.2017.8003150","type":"proceedings-article","created":{"date-parts":[[2017,8,9]],"date-time":"2017-08-09T16:24:59Z","timestamp":1502295899000},"page":"729-734","source":"Crossref","is-referenced-by-count":5,"title":["An optimal reputation-based detection against SSDF attacks in industrial cognitive radio network"],"prefix":"10.1109","author":[{"given":"Pujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Cailian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shanying","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinping","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387549"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417581"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0082"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198638"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.640"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2009.4917589"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2307951"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2422735"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2091277"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.26"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654927"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2491267"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654927"}],"event":{"name":"2017 13th IEEE International Conference on Control & Automation (ICCA)","start":{"date-parts":[[2017,7,3]]},"location":"Ohrid, Macedonia","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 13th IEEE International Conference on Control &amp; Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999333\/8003024\/08003150.pdf?arnumber=8003150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:35:09Z","timestamp":1504744509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8003150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icca.2017.8003150","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}