{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:09:01Z","timestamp":1759936141023,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599849","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T18:10:39Z","timestamp":1546539039000},"page":"201-206","source":"Crossref","is-referenced-by-count":5,"title":["How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?"],"prefix":"10.1109","author":[{"given":"Alireza","family":"Nooraiepour","sequence":"first","affiliation":[]},{"given":"Kenza","family":"Hamidouche","sequence":"additional","affiliation":[]},{"given":"Waheed U.","family":"Bajwa","sequence":"additional","affiliation":[]},{"given":"Narayan","family":"Mandayam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2015.7343934"},{"key":"ref11","first-page":"1101","article-title":"Physical-layer security of NC-OFDM-based systems","author":"sridharan","year":"2016","journal-title":"Military Communications Conference (MIL COM)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061510.091080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415833"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.85"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","volume":"abs 1412 6980","author":"kingma","year":"2014","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"journal-title":"Wireless Security","year":"2001","author":"nichols","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179633"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130904"},{"journal-title":"Buisnessinsider (2015) The most hackable cars on the road","year":"0","key":"ref8"},{"journal-title":"Bigthink (2016) Hacking the human heart","year":"0","key":"ref7"},{"journal-title":"The effect of IoT new features on security and privacy New threats existing solutions and challenges yet to be solved","year":"2018","author":"zhou","key":"ref2"},{"journal-title":"Cisco visual networking index Forecast and methodology","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2006.363452"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599849.pdf?arnumber=8599849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T20:45:54Z","timestamp":1643143554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599849","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}