{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:10:59Z","timestamp":1730236259620,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/iccnc.2017.7876109","type":"proceedings-article","created":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T00:16:38Z","timestamp":1489450598000},"page":"100-104","source":"Crossref","is-referenced-by-count":9,"title":["A game-theoretic analysis of energy-depleting jamming attacks"],"prefix":"10.1109","author":[{"given":"Chiara","family":"Pielli","sequence":"first","affiliation":[]},{"given":"Federico","family":"Chiariotti","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Laurenti","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Zanella","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.03.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235211"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref15","first-page":"41","article-title":"A Bayesian jamming game in an OFDM wireless network","author":"garnaev","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/26.864173"},{"key":"ref17","first-page":"57","article-title":"Improving reliability of jamming attack detection in ad hoc networks","volume":"3","author":"thamilarasu","year":"2011","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"ref18","first-page":"117","article-title":"Power napping with loud neighbors: Optimal energy-constrained jamming and anti-jamming","author":"debruhl","year":"0"},{"journal-title":"Dynamic Noncooperative Game Theory","year":"1999","author":"basar","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.921621"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"ref5","first-page":"304","article-title":"Analysis of the WSN MAC protocols under jamming DoS attack","volume":"16","author":"mihajlov","year":"2014","journal-title":"International Journal of Network Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref7","article-title":"Ghost-in-the-wireless: Energy depletion attack on zigbee","author":"shila","year":"2014","journal-title":"arXiv preprint arXiv 1410 1613"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"journal-title":"white paper Cisco","article-title":"Cisco visual networking index: Forecast and methodology, 2015&#x2013;2020","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/0112033"}],"event":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2017,1,26]]},"location":"Silicon Valley, CA, USA","end":{"date-parts":[[2017,1,29]]}},"container-title":["2017 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7871262\/7876087\/07876109.pdf?arnumber=7876109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:43:58Z","timestamp":1513179838000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7876109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2017.7876109","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}