{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:42:59Z","timestamp":1730281379335,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,3]]},"DOI":"10.1109\/mascots53633.2021.9614261","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T21:15:06Z","timestamp":1637615706000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Exact and Efficient Protective Jamming in SINR-based Wireless Networks"],"prefix":"10.1109","author":[{"given":"Dominik","family":"Bojko","sequence":"first","affiliation":[]},{"given":"Marek","family":"Klonowski","sequence":"additional","affiliation":[]},{"given":"Dariusz R.","family":"Kowalski","sequence":"additional","affiliation":[]},{"given":"Mateusz","family":"Marciniak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)","year":"2005","author":"pahlavan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2807693"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.04.018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39212-2_55"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-014-0222-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935077"},{"key":"ref16","first-page":"17","article-title":"A review on security challenges and features in wireless sensor networks: Iot perspective","volume":"10","author":"burhanuddin","year":"2018","journal-title":"Journal of Telecommunication Electronic and Computer Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1700063"},{"key":"ref18","first-page":"48","article-title":"A survey on wireless security protocols (wep, wpa and wpa2\/802.11i)","author":"lashkari","year":"0","journal-title":"ICCSIT 2009"},{"journal-title":"Wireless Security and Cryptography Specifications and Implementations","year":"2007","author":"sklavos","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.07.011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582750"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23829-6_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039423"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2348498"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-2864-4_604"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514298"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11872153_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248383"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414487"}],"event":{"name":"2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","start":{"date-parts":[[2021,11,3]]},"location":"Houston, TX, USA","end":{"date-parts":[[2021,11,5]]}},"container-title":["2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9614238\/9614259\/09614261.pdf?arnumber=9614261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:52:37Z","timestamp":1652201557000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9614261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mascots53633.2021.9614261","relation":{},"subject":[],"published":{"date-parts":[[2021,11,3]]}}}