{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:44:30Z","timestamp":1725612270364},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/iccnc.2015.7069323","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T09:40:57Z","timestamp":1433238057000},"page":"99-103","source":"Crossref","is-referenced-by-count":8,"title":["On simulation studies of jamming threats against LTE networks"],"prefix":"10.1109","author":[{"given":"Sulabh","family":"Bhattarai","sequence":"first","affiliation":[]},{"given":"Sixiao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Rook","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Robert F.","family":"Erbacher","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310843"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962467"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2093256.2093296"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.VALUETOOLS2009.7647"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.662915"},{"journal-title":"Jamming cell phones and gps equipment is against the law","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.136"},{"journal-title":"Network Simulator-3","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2556871.2556882"},{"key":"ref7","article-title":"Security attacks against the availability of lte mobility networks: Overview and research directions","author":"jover","year":"0","journal-title":"Tech Rep Tech Rep"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2013.057688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"journal-title":"Enterprise Networking","year":"0","key":"ref1"}],"event":{"name":"2015 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2015,2,16]]},"location":"Garden Grove, CA, USA","end":{"date-parts":[[2015,2,19]]}},"container-title":["2015 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7057023\/7069279\/07069323.pdf?arnumber=7069323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:02:53Z","timestamp":1490371373000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7069323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2015.7069323","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}