{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:17:51Z","timestamp":1729667871423,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/vtcfall.2017.8288187","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T17:55:22Z","timestamp":1518458122000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Performance Analysis of a Mission-Critical Portable LTE System in Targeted RF Interference"],"prefix":"10.1109","author":[{"given":"Vuk","family":"Marojevic","sequence":"first","affiliation":[]},{"given":"Raghunandan M.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Jeffrey H.","family":"Reed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/GLOCOM.2014.7036895"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"ref12","first-page":"315","article-title":"Analyzing and enhancing the resilience of LTE\/LTE-A","author":"labib","year":"2015","journal-title":"Proc IEEE Conf Standards Commun Netw (CSCN)"},{"key":"ref13","article-title":"Software-defined testbed enabling rapid prototyping and controlled experiments for the LTE evolution","author":"marojevic","year":"2017","journal-title":"IEEE WCNC 19&#x2013;22"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICCNC.2016.7440650"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MCOM.2017.1500706CM"},{"year":"0","journal-title":"srsLTE - Open Source LTE","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1514274.1514299"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MWC.2011.5751298"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TNET.2010.2068576"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.csi.2008.09.038"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICCNC.2015.7069323"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2014.2320973"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: the case of jammers","volume":"13","author":"konstantinos","year":"2011","journal-title":"IEEE Commun Surveys & Tutorials"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MCOM.2016.7432144"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MILCOM.2014.43"}],"event":{"name":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","start":{"date-parts":[[2017,9,24]]},"location":"Toronto, ON","end":{"date-parts":[[2017,9,27]]}},"container-title":["2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8283330\/8287863\/08288187.pdf?arnumber=8288187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T17:22:19Z","timestamp":1570728139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8288187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2017.8288187","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}