{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:59:03Z","timestamp":1761580743740},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wiopt.2009.5291621","type":"proceedings-article","created":{"date-parts":[[2009,12,18]],"date-time":"2009-12-18T13:16:59Z","timestamp":1261142219000},"page":"1-10","source":"Crossref","is-referenced-by-count":32,"title":["Gaming the jammer: Is frequency hopping effective?"],"prefix":"10.1109","author":[{"given":"K.","family":"Pelechrinis","sequence":"first","affiliation":[]},{"given":"C.","family":"Koufogiannakis","sequence":"additional","affiliation":[]},{"given":"S.V.","family":"Krishnamurthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.500"},{"journal-title":"Theory of Games and Economic Behavior","year":"1980","author":"von neumann","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.316"},{"journal-title":"Soekris-net4826","year":"0","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140286"},{"journal-title":"The MadWiFi Driver","year":"0","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"16","article-title":"Linear Programming Models for Jamming Attacks on Network Traffic Flows","author":"tague","year":"2007","journal-title":"Network Security Lab (NSL) Technical Report"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.171"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/26.864173"},{"journal-title":"Users Fear Wireless Networks for Control","year":"0","key":"11"},{"journal-title":"Understanding wireless LAN performance tradeoffs","year":"2002","author":"yee","key":"12"},{"key":"21","article-title":"Adjacent channel interference in a multi-radio wireless mesh node with 802.11a\/g interfaces","author":"angelakis","year":"2007","journal-title":"IEEE INFOCOM Poster Session"},{"journal-title":"Jamming attack","year":"0","key":"3"},{"key":"20","article-title":"Experimenting with a Multi-Radio Mesh Networking Testbed","author":"robinson","year":"2005","journal-title":"1st workshop on Wireless Network Measurements (WiNMee"},{"journal-title":"ISM wide-band jammers","year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","article-title":"Component Based Channel Assignment in Single Radio, Multi-channel Ad Hoc Networks","author":"vedantham","year":"2006","journal-title":"ACM MOBICOM"},{"key":"7","article-title":"Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service","author":"hu","year":"2004","journal-title":"ACM Workshop on Wireless Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"year":"0","author":"jamming attack","key":"5"},{"journal-title":"Techworld news","year":"0","key":"4"},{"key":"9","article-title":"Jamming Sensor Networks: Attacks and Defense Strategies","author":"hu","year":"2006","journal-title":"IEEE Network"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282424"}],"event":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt 2009","start":{"date-parts":[[2009,6,23]]},"location":"Seoul","end":{"date-parts":[[2009,6,27]]}},"container-title":["2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5286911\/5291544\/05291621.pdf?arnumber=5291621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T18:42:07Z","timestamp":1489862527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5291621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2009.5291621","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}