{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:47:14Z","timestamp":1730281634375,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/medcomnet55087.2022.9810431","type":"proceedings-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:38:27Z","timestamp":1656704307000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Blockage-Peeking Game of Mobile Strategic Nodes in Millimeter Wave Communications"],"prefix":"10.1109","author":[{"given":"Leonardo","family":"Badia","sequence":"first","affiliation":[{"name":"University of Padova,Dept. of Information Engineering (DEI),Italy"}]},{"given":"Andrea","family":"Bedin","sequence":"additional","affiliation":[{"name":"University of Padova,Dept. of Information Engineering (DEI),Italy"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00199-009-0449-x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2007.908563"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2010.5657706"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6825181"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.06.019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2017.8031621"},{"key":"ref36","first-page":"173","article-title":"Notes on games over the square","volume":"ii","author":"glicksberg","year":"2016","journal-title":"Contributions to the Theory of Games (AM-28)"},{"journal-title":"Game Theory An Introduction","year":"2012","author":"tadelis","key":"ref35"},{"journal-title":"CST Microwave Studio","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00167"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2992665"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978424"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3121560"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2841921"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3107526"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083804"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob52687.2021.9606382"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3020898"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2017.7974348"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72709-5_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-018-00291-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-007-9071-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417412"},{"key":"ref29","first-page":"1059","article-title":"Network security configurations: A nonzero-sum stochastic game approach","author":"zhu","year":"2010","journal-title":"Proc IEEE ACC"},{"key":"ref5","first-page":"1","article-title":"A zerosum jamming game with incomplete position information in wireless scenarios","author":"scalabrin","year":"2015","journal-title":"Proc European Wireless"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2893536"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0942-z"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978423"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2982966"},{"journal-title":"La vita nuova","year":"1294","author":"alighieri","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD52502.2021.9617811"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010551"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JQE.2015.2509242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.082813.120710"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3073140"}],"event":{"name":"2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)","start":{"date-parts":[[2022,6,1]]},"location":"Pafos, Cyprus","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810329\/9810360\/09810431.pdf?arnumber=9810431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:20:55Z","timestamp":1658780455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9810431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/medcomnet55087.2022.9810431","relation":{},"subject":[],"published":{"date-parts":[[2022,6,1]]}}}