{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:19Z","timestamp":1763467879559},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/isit.2007.4557594","type":"proceedings-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T00:17:12Z","timestamp":1215562632000},"page":"2496-2500","source":"Crossref","is-referenced-by-count":52,"title":["Broadcast Control Channel Jamming: Resilience and Identification of Traitors"],"prefix":"10.1109","author":[{"given":"Agnes","family":"Chan","sequence":"first","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[]},{"given":"Bishal","family":"Thapa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574719"},{"article-title":"Control channel jamming: Resilience and identifi cation of traitors","year":"2007","author":"chan","key":"ref13"},{"key":"ref4","article-title":"On link layer denial of service in data wireless lans","author":"lin","year":"2004","journal-title":"Wiley Journal on Wireless Communications and Mobile Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_25"},{"key":"ref6","article-title":"802.11 denial-of-service attacks: Real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"year":"0","key":"ref5"},{"journal-title":"Spread Spectrum Communications Handbook","year":"2001","author":"simon","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014526713037"},{"year":"0","key":"ref2"},{"key":"ref1","article-title":"GSM Networks","author":"heine","year":"1999","journal-title":"Protocols Terminology and Implementation"},{"key":"ref9","article-title":"Spread: Foiling smiart jammIlers usinig multi-layer agility","author":"liu","year":"2007","journal-title":"Proceedings of the IEEE INFOCOMO7 Mini-Symposium"}],"event":{"name":"2007 IEEE International Symposium on Information Theory","start":{"date-parts":[[2007,6,24]]},"location":"Nice","end":{"date-parts":[[2007,6,29]]}},"container-title":["2007 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4497218\/4557062\/04557594.pdf?arnumber=4557594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:22:30Z","timestamp":1489692150000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4557594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2007.4557594","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}