{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:23Z","timestamp":1759335683153,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010665","name":"European Union\u2019s Horizon 2020 Research and Innovation Programme through the Marie Sk\u0142odowska-Curie","doi-asserted-by":"publisher","award":["764785 (FORA\u2014Fog Computing for Robotics and Industrial Automation)"],"award-info":[{"award-number":["764785 (FORA\u2014Fog Computing for Robotics and Industrial Automation)"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Serendipity Project through the Swedish Foundation for Strategic Research"},{"DOI":"10.13039\/501100011751","name":"AIDOaRT, the ECSEL Joint Undertaking","doi-asserted-by":"publisher","award":["101007350"],"award-info":[{"award-number":["101007350"]}],"id":[{"id":"10.13039\/501100011751","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme and Sweden, Austria, Czech Republic, Finland, France, Italy, Spain"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2023.3339175","type":"journal-article","created":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T18:31:55Z","timestamp":1701801115000},"page":"112-126","source":"Crossref","is-referenced-by-count":5,"title":["Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8109-1685","authenticated-orcid":false,"given":"Van-Lan","family":"Dao","sequence":"first","affiliation":[{"name":"School of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6497-4099","authenticated-orcid":false,"given":"Elisabeth","family":"Uhlemann","sequence":"additional","affiliation":[{"name":"School of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9589-6986","authenticated-orcid":false,"given":"Svetlana","family":"Girs","sequence":"additional","affiliation":[{"name":"School of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3081601"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.007.2100553"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3145234"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023275"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2343971"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2417119"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263349"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3059069"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3205046"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3039536"},{"year":"2020","key":"ref11","article-title":"Cisco Annual Internet Report (2018\u20132023)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3148857"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3103540"},{"volume-title":"Reactive Jamming Attack","year":"2023","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.821914"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2574709"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3202006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103892"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3269501"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3267564"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647831"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2797091"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC50192.2020.9309460"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NICS48868.2019.9023818"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT50939.2020.9295870"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SigTelCom49868.2020.9199063"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3140266"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955118"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38819-5_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926770"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2020.3043019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022279"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3099256"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148113"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992455"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3133907"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63083-6_3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09575-4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3148261"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3224279"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2200239"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/647037"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2022.3225165"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0102"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757160"},{"volume-title":"Reinforcement Learning: An Introduction","year":"2018","author":"Sutton","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108691"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2947670"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10362961\/10342734.pdf?arnumber=10342734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:27:40Z","timestamp":1705022860000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10342734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2023.3339175","relation":{},"ISSN":["2644-125X"],"issn-type":[{"type":"electronic","value":"2644-125X"}],"subject":[],"published":{"date-parts":[[2024]]}}}