{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:44:04Z","timestamp":1761648244185,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-13-C-0082"],"award-info":[{"award-number":["HR0011-13-C-0082"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/tifs.2015.2398360","type":"journal-article","created":{"date-parts":[[2015,2,2]],"date-time":"2015-02-02T15:20:43Z","timestamp":1422890443000},"page":"1064-1075","source":"Crossref","is-referenced-by-count":23,"title":["One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious"],"prefix":"10.1109","volume":"10","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/GLOCOM.2012.6503252"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-319-03871-1_15","article-title":"Stationary equilibrium strategies for bandwidth scanning","volume":"8310","author":"garnaev","year":"2013","journal-title":"Multiple Access Communcations"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2480741.2480742"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JSAC.2008.080928"},{"key":"ref14","article-title":"Challenges in applying game theory to the domain of information warfare","author":"hamilton","year":"2002","journal-title":"Proc 4th Inf Survivability Workshop"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2014.2329241"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-30373-9_30"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1190195.1190198"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11276-007-0088-8"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.peva.2009.08.002"},{"year":"2009","author":"fette","journal-title":"Cognitive Radio Technology","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1137\/0112033"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.comnet.2006.05.001"},{"year":"1998","author":"verd\u00fa","journal-title":"Multiuser Detection","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/INFCOM.2009.5061975"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2006.887483"},{"year":"2004","author":"van trees","journal-title":"Detection Estimation and Modulation Theory Radar-Sonar Signal Processing and Gaussian Signals in Noise","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MOMUC.1999.819467"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/PROC.1967.5573"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JSAC.2004.839380"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/NCA.2004.1347798"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CAMSAP.2009.5413309"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1155\/2009\/452907"},{"key":"ref24","first-page":"3496","article-title":"Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network","volume":"5","author":"st jean","year":"2004","journal-title":"Proc IEEE 60th Veh Technol Conf (VTC)"},{"year":"1999","author":"heikkinen","article-title":"A minmax game of power control in a wireless network under incomplete information","key":"ref23"},{"year":"1991","author":"fudenberg","journal-title":"Game Theory","key":"ref26"},{"year":"2007","author":"adlakha","article-title":"Competition in wireless systems via Bayesian interference games","key":"ref25"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7073680\/07029045.pdf?arnumber=7029045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:47:36Z","timestamp":1641988056000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":27,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2398360","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}