{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:58Z","timestamp":1740131698828,"version":"3.37.3"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-14-1-0340"],"award-info":[{"award-number":["W911NF-14-1-0340"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tcomm.2016.2535257","type":"journal-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T14:18:06Z","timestamp":1456496286000},"page":"1411-1422","source":"Crossref","is-referenced-by-count":9,"title":["Disruptive Attacks on Video Tactical Cognitive Radio Downlinks"],"prefix":"10.1109","volume":"64","author":[{"given":"Madushanka","family":"Soysa","sequence":"first","affiliation":[]},{"given":"Pamela C.","family":"Cosman","sequence":"additional","affiliation":[]},{"given":"Laurence B.","family":"Milstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/IWCMC.2012.6314233"},{"year":"1985","author":"simon","journal-title":"Spread Spectrum Communications","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/GlobalSIP.2013.6737120"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TCOMM.2014.2331964"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TVT.2007.897647"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TCSVT.2007.905532"},{"year":"2015","author":"soysa","journal-title":"Detailed Presentation of the Optimization Approach","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WICOM.2010.5601409"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TVT.2010.2043966"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/DYSPAN.2008.16"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JSAC.2011.110420"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TWC.2010.112310.100630"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2010.091510.100629"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s11036-008-0085-x"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JSAC.2004.839380"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCOMM.2012.071812.100729"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/7452695\/7420660.pdf?arnumber=7420660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:21Z","timestamp":1641987741000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7420660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":16,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2016.2535257","relation":{},"ISSN":["0090-6778"],"issn-type":[{"type":"print","value":"0090-6778"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}