{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:38Z","timestamp":1763468258758,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1409453"],"award-info":[{"award-number":["CNS-1409453"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2746285.2746319","type":"proceedings-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:43:54Z","timestamp":1434134634000},"page":"237-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Mitigating Rate Attacks through Crypto-Coded Modulation"],"prefix":"10.1145","author":[{"given":"Triet D.","family":"Vo-Huu","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074023"},{"volume-title":"Massachusetts Intitute of Technology","year":"2005","author":"Bicket J. C.","key":"e_1_3_2_1_5_1"},{"issue":"122","key":"e_1_3_2_1_6_1","article-title":"Tools for Exploring the Radio Frequency Spectrum","volume":"2004","author":"Blossom E.","year":"2004","journal-title":"Linux J."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_2"},{"volume-title":"NDSS","year":"2013","author":"Cassola A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.623175"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1522301"},{"key":"e_1_3_2_1_11_1","unstructured":"Ettus Research. Universal Software Radio Peripheral.  Ettus Research. Universal Software Radio Peripheral."},{"volume-title":"FCC enforcement bureau steps up education and enforcement efforts against cellphone and gps jamming","year":"2013","author":"FCC.","key":"e_1_3_2_1_12_1"},{"volume-title":"FCC fines jammers","year":"2013","author":"FCC.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"FCC. Marriott hotels fined$600 000 by FCC for jamming Wi-Fi hotspots October 2014.  FCC. Marriott hotels fined$600 000 by FCC for jamming Wi-Fi hotspots October 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2011.5766194"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185452"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2013.6552290"},{"key":"e_1_3_2_1_18_1","article-title":"On the performance of adaptive packetized wireless communication links under jamming. Wireless Communications","author":"Firouzbakht K.","year":"2014","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036896"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_16"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-0107-6_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1027503"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530779"},{"key":"e_1_3_2_1_24_1","article-title":"A fast and accurate single frequency estimator. Acoustics, Speech and Signal Processing","author":"Kay S.","year":"1989","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.316"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023663.1023687"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v5:3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/983680"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920315"},{"volume-title":"Bit-rate selection algorithms","year":"2012","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627788.2627798"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998430"},{"volume-title":"MadWifi rate control","year":"2011","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503251"},{"volume-title":"Jamming-resistant rate adaptation in wi-fi networks. Performance Evaluation, 75--76(0):50--68","year":"2014","author":"Orakcal C.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658960"},{"volume-title":"Denial of service attacks in wireless networks: The case of jammers. Communications Surveys & Tutorials","year":"2011","author":"Pelechrinis K.","key":"e_1_3_2_1_38_1"},{"volume-title":"Artech House Publishers","year":"2011","author":"Poisel R.","key":"e_1_3_2_1_39_1"},{"volume-title":"Digital Communications. 5 edition","year":"2007","author":"Proakis J. G.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627415"},{"volume-title":"Sep.","year":"2014","author":"Schneier B.","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WIOPT2008.3170"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056454"},{"volume-title":"SCADA wireless systems","year":"2011","author":"ICL.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","unstructured":"T. D. Vo-Huu and G. Noubir. CBM source code. http:\/\/www.ccs.neu.edu\/home\/noubir\/projects\/cbm.  T. D. Vo-Huu and G. Noubir. CBM source code. http:\/\/www.ccs.neu.edu\/home\/noubir\/projects\/cbm."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592571"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161107"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387664"}],"event":{"name":"MobiHoc'15: The Sixteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Hangzhou China","acronym":"MobiHoc'15"},"container-title":["Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746319","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746285.2746319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:57Z","timestamp":1750227417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":52,"alternative-id":["10.1145\/2746285.2746319","10.1145\/2746285"],"URL":"https:\/\/doi.org\/10.1145\/2746285.2746319","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}