{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:30Z","timestamp":1763468070068,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2185448.2185452","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["On the capacity of rate-adaptive packetized wireless communication links under jamming"],"prefix":"10.1145","author":[{"given":"Koorosh","family":"Firouzbakht","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Masoud","family":"Salehi","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"e_1_3_2_1_2_1","volume-title":"Dynamic Noncooperative Game Theory","author":"Basar T.","year":"1999","unstructured":"T. Basar and G. J. Olsder . Dynamic Noncooperative Game Theory . Academic Press , 1999 . T. Basar and G. J. Olsder. Dynamic Noncooperative Game Theory. Academic Press, 1999."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074023"},{"key":"e_1_3_2_1_5_1","volume-title":"Bit-rate selection in wireless networks. MIT Master's Thesis","author":"Bicket J.","year":"2005","unstructured":"J. Bicket . Bit-rate selection in wireless networks. MIT Master's Thesis , 2005 . J. Bicket. Bit-rate selection in wireless networks. MIT Master's Thesis, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409981"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557594"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287901"},{"key":"e_1_3_2_1_10_1","volume-title":"Elements of Information Theory","author":"Cover T. M.","year":"2006","unstructured":"T. M. Cover and J. A. Thomas . Elements of Information Theory . Wiley , 2006 . T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Notes on the Two-Player Zero-Sum Game With the Average Jamming Power Constraint","author":"Firouzbakht K.","year":"2011","unstructured":"K. Firouzbakht . Notes on the Two-Player Zero-Sum Game With the Average Jamming Power Constraint , 2011 . Available On-line : http:\/\/myfiles.neu.edu\/ firouzbakht.k\/Notes\/TechnicalManual.pdf?uniq=-s4dgc0. K. Firouzbakht. Notes on the Two-Player Zero-Sum Game With the Average Jamming Power Constraint, 2011. Available On-line: http:\/\/myfiles.neu.edu\/ firouzbakht.k\/Notes\/TechnicalManual.pdf?uniq=-s4dgc0."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2011.5766194"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381700"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530779"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378615"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.316"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146420"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023663.1023687"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514299"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v5:3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v5:3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833639"},{"key":"e_1_3_2_1_26_1","first-page":"286","volume-title":"Annuals of Mathematics","author":"Nash J.","year":"1951","unstructured":"J. Nash . Non-cooperative games. Annuals of Mathematics , pages 286 -- 295 , 1951 . J. Nash. Non-cooperative games. Annuals of Mathematics, pages 286--295, 1951."},{"key":"e_1_3_2_1_27_1","volume-title":"Jamming analysis of MAC protocols. Technical report","author":"Negi R.","year":"2003","unstructured":"R. Negi and A. Perrig . Jamming analysis of MAC protocols. Technical report , Carnegie Mellon University , 2003 . R. Negi and A. Perrig. Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University, 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998430"},{"key":"e_1_3_2_1_29_1","unstructured":"G. Owen. Game Theory. Academic Press 1995.  G. Owen. Game Theory. Academic Press 1995."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"key":"e_1_3_2_1_31_1","volume-title":"Introduction to Spread-Spectrum Communications","author":"Peterson R. K.","year":"1995","unstructured":"R. K. Peterson , R. E. Ziemer , and D. E. Borth . Introduction to Spread-Spectrum Communications . Prentice-Hall , 1995 . R. K. Peterson, R. E. Ziemer, and D. E. Borth. Introduction to Spread-Spectrum Communications. Prentice-Hall, 1995."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614342"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378616"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287892"},{"key":"e_1_3_2_1_35_1","volume-title":"Spread Spectrum Communications Handbook","author":"Simon M. K.","year":"2001","unstructured":"M. K. Simon , J. K. Omura , R. A. Scholtz , and B. K. Levitt . Spread Spectrum Communications Handbook . McGraw-Hill , 2001 . M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514297"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530778"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394778"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WIOPT2008.3170"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592571"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.920730"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161107"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236423"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387664"}],"event":{"name":"WISEC'12: Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Tucson Arizona USA","acronym":"WISEC'12"},"container-title":["Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2185448.2185452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:46Z","timestamp":1750241206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":48,"alternative-id":["10.1145\/2185448.2185452","10.1145\/2185448"],"URL":"https:\/\/doi.org\/10.1145\/2185448.2185452","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}