{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:14:11Z","timestamp":1774455251680,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"KAUST Office of Sponsored Research"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3594284","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T18:37:40Z","timestamp":1753987060000},"page":"7125-7149","source":"Crossref","is-referenced-by-count":12,"title":["Jamming Intrusions in Extreme Bandwidth Communication: A Comprehensive Overview"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0477-0884","authenticated-orcid":false,"given":"Richa","family":"Priyadarshani","sequence":"first","affiliation":[{"name":"Communication and Computer Engineering Department, The LNM Institute of Information Technology, Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6867-4277","authenticated-orcid":false,"family":"Ki-Hong","sequence":"additional","affiliation":[{"name":"Computer, Electrical, and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7781-4182","authenticated-orcid":false,"given":"Yal\u00e7\u0131n","family":"Ata","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, OSTIM Technical University, Ankara, T&#x00FC;rkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4827-1793","authenticated-orcid":false,"given":"Mohamed-Slim","family":"Alouini","sequence":"additional","affiliation":[{"name":"Computer, Electrical, and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3010270"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2021.3116420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6894452"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-30201-0","volume-title":"Optical Wireless Communications-An Emerging Technology","author":"Uysal","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10297-005-0054-0"},{"key":"ref6","volume-title":"Optical Communication Systems (OPT428)","author":"Agarwal","year":"2007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2014.066419"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ict52184.2021.9511465"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3750493"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2200154"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2019.04.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref18","volume-title":"Radio jamming.","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref20","volume-title":"EW 102: A Second Course Electron Warfare","author":"Adamy","year":"2003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23976-3_24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016462"},{"key":"ref23","first-page":"80","article-title":"Channel surfing and spatial retreats: Defenses against wireless denial of service","volume-title":"Proc. ACM Workshop Wireless Secur. (WiSe)","author":"Wenyuan"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12190"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918964"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ARFTG56062.2023.10148889"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013380"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2932068"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2014.6848218"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997478"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2020.100048"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3247488"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3359286"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647173"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/OJCAS.2021.3105228"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356353"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265341"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860543"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448634"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017817"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN53946.2021.9677168"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IRMMW-THz50927.2022.9895867"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008551"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3038902"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163396"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA60121.2023.00029"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0609-x"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2017.2738098"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964149"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3326123"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860894"},{"key":"ref56","volume-title":"Application note\u20141550nm transmission for military applications.","year":"2024"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2161\/1\/012011"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2018.8473952"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2018.8473921"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2957461"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2019.2930141"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/app12042228"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3341912"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2021.3060974"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3281077"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246817"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON59386.2023.10207479"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TELSIKS57806.2023.10315967"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007429"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2018.8373785"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6685754"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476474"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4781-3"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2019.2955023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151627"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2019.8697198"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3065907"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7096286"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210383"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11105396.pdf?arnumber=11105396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T05:16:07Z","timestamp":1757654167000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11105396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3594284","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}