{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T12:32:20Z","timestamp":1763987540756,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462103","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"31-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Counter-jamming using mixed mechanical and software interference cancellation"],"prefix":"10.1145","author":[{"given":"Triet D.","family":"Vo-Huu","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Erik-Oliver","family":"Blass","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074023"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"24","article-title":"Phased arrays and radars - past, present and future","volume":"49","author":"Brookner E.","year":"2006","unstructured":"E. Brookner . Phased arrays and radars - past, present and future . Microwave Journal , 49 ( 1 ): 24 -- 46 , 2006 . ISSN 01926225. E. Brookner. Phased arrays and radars - past, present and future. Microwave Journal, 49(1):24--46, 2006. ISSN 01926225.","journal-title":"Microwave Journal"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"30","article-title":"Past, astounding breakthroughs, and future trends","volume":"51","author":"Brookner E.","year":"2008","unstructured":"E. Brookner . Phased-array radar : Past, astounding breakthroughs, and future trends . Microwave Journal , 51 ( 1 ): 30 -- 50 , 2008 . ISSN 01926225. E. Brookner. Phased-array radar: Past, astounding breakthroughs, and future trends. Microwave Journal, 51(1):30--50, 2008. ISSN 01926225.","journal-title":"Microwave Journal"},{"key":"e_1_3_2_1_5_1","article-title":"Efficient spread spectrum communication without pre-shared secrets","author":"Cassola A.","unstructured":"A. Cassola , T. Jin , G. Noubir , and B. Thapa . Efficient spread spectrum communication without pre-shared secrets . IEEE Transactions on Mobile Computing, to appear. A. Cassola, T. Jin, G. Noubir, and B. Thapa. Efficient spread spectrum communication without pre-shared secrets. IEEE Transactions on Mobile Computing, to appear.","journal-title":"IEEE Transactions on Mobile Computing, to appear."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of NDSS","author":"Cassola A.","year":"2013","unstructured":"A. Cassola , W. Robertson , E. Kirda , and G. Noubir . A practical, targeted, and stealthy attack against wpa enterprise authentication . In Proceedings of NDSS , 2013 . A. Cassola, W. Robertson, E. Kirda, and G. Noubir. A practical, targeted, and stealthy attack against wpa enterprise authentication. In Proceedings of NDSS, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.177"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1859997"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514292"},{"key":"e_1_3_2_1_10_1","unstructured":"FCC. Jammer enforcement 2012. http:\/\/www.fcc.gov\/encyclopedia\/jammer-enforcement http:\/\/transition.fcc.gov\/eb\/News_Releases\/DOC-304575A1.html.  FCC. Jammer enforcement 2012. http:\/\/www.fcc.gov\/encyclopedia\/jammer-enforcement http:\/\/transition.fcc.gov\/eb\/News_Releases\/DOC-304575A1.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_16"},{"key":"e_1_3_2_1_12_1","unstructured":"GNU. Gnu radio. http:\/\/www.gnuradio.org.  GNU. Gnu radio. http:\/\/www.gnuradio.org."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"e_1_3_2_1_14_1","unstructured":"iClinks. Scada and industrial automation ethernet scada and ethernet i\/o. http:\/\/www.iclinks.com\/.  iClinks. Scada and industrial automation ethernet scada and ethernet i\/o. http:\/\/www.iclinks.com\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030647"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530779"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146420"},{"key":"e_1_3_2_1_18_1","volume-title":"Mcgraw Hill Higher Education","author":"Kraus J.-D.","year":"2001","unstructured":"J.-D. Kraus . Antennas. Mcgraw Hill Higher Education ; 3 rd edition, 2001 . J.-D. Kraus. Antennas. Mcgraw Hill Higher Education; 3rd edition, 2001.","edition":"3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920315"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998420"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833639"},{"key":"e_1_3_2_1_22_1","volume-title":"Artech Print on Demand","author":"Mailloux R.","year":"2005","unstructured":"R. Mailloux . Phased Array Antenna Handbook . Artech Print on Demand , 2005 . R. Mailloux. Phased Array Antenna Handbook. Artech Print on Demand, 2005."},{"key":"e_1_3_2_1_23_1","unstructured":"R. Miller. FCC steps up crackdown on cell jammers 2012. http:\/\/www.securitysystemsnews.com\/article\/fcc-steps-crackdown-cell-jammers.  R. Miller. FCC steps up crackdown on cell jammers 2012. http:\/\/www.securitysystemsnews.com\/article\/fcc-steps-crackdown-cell-jammers."},{"key":"e_1_3_2_1_24_1","unstructured":"NPR. Congress passes FAA bill that speeds switch to GPS 2012. http:\/\/www.npr.org\/.  NPR. Congress passes FAA bill that speeds switch to GPS 2012. http:\/\/www.npr.org\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"key":"e_1_3_2_1_26_1","volume-title":"Smart meters by the numbers","author":"PG","year":"2011","unstructured":"PG & E. Smart meters by the numbers , 2011 . http:\/\/www.pge.com\/myhome\/customerservice\/smartmeter\/deployment\/. PG & E. Smart meters by the numbers, 2011. http:\/\/www.pge.com\/myhome\/customerservice\/smartmeter\/deployment\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Digital Communications","author":"Proakis J. G.","year":"2007","unstructured":"J. G. Proakis and M. Salehi . Digital Communications . McGraw-Hill , 5 edition, 2007 . J. G. Proakis and M. Salehi. Digital Communications. McGraw-Hill, 5 edition, 2007."},{"key":"e_1_3_2_1_28_1","unstructured":"E. Research. Universal software radio peripheral. http:\/\/www.ettus.com\/.  E. Research. Universal software radio peripheral. http:\/\/www.ettus.com\/."},{"key":"e_1_3_2_1_29_1","unstructured":"SEMAPHORE. Integrated scada control and communication solutions. http:\/\/www.cse-semaphore.com\/ 2011.  SEMAPHORE. Integrated scada control and communication solutions. http:\/\/www.cse-semaphore.com\/ 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Spread Spectrum Communications Handbook","author":"Simon M. K.","year":"2001","unstructured":"M. K. Simon , J. K. Omura , R. A. Scholtz , and B. K. Levitt . Spread Spectrum Communications Handbook . McGraw-Hill , 2001 . M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514297"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530778"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"e_1_3_2_1_34_1","unstructured":"Synetcom. Synetcom industrial wireless systems. http:\/\/www.synetcom.com\/.  Synetcom. Synetcom industrial wireless systems. http:\/\/www.synetcom.com\/."},{"key":"e_1_3_2_1_35_1","volume-title":"Detection, Estimation, and Modulation Theory","author":"Trees H. V.","year":"2001","unstructured":"H. V. Trees . Detection, Estimation, and Modulation Theory , Part I. Wiley & Sons, 2001 . H. V. Trees. Detection, Estimation, and Modulation Theory, Part I. Wiley & Sons, 2001."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_3_2_1_37_1","unstructured":"uPrint. Uprint plus. http:\/\/www.uprint3dprinting.com\/.  uPrint. Uprint plus. http:\/\/www.uprint3dprinting.com\/."},{"key":"e_1_3_2_1_38_1","unstructured":"vMonitor. Scada wireless systems. http:\/\/www.vmonitor.com\/ 201  vMonitor. Scada wireless systems. http:\/\/www.vmonitor.com\/ 201"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236423"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161243"}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Budapest Hungary","acronym":"WISEC'13"},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":42,"alternative-id":["10.1145\/2462096.2462103","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462103","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}