{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:54Z","timestamp":1763468274892,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766515","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Freedom of speech: thwarting jammers via a probabilistic approach"],"prefix":"10.1145","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[{"name":"Bell Labs, Paris, France and University of Padua"}]},{"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Roma Tre, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.136"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699906"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2226718"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523802"},{"volume-title":"Elseviers","year":"2015","author":"Di Pietro R.","key":"e_1_3_2_1_5_1"},{"first-page":"186","volume-title":"IPDPS '01","author":"Elson J.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","article-title":"Exploiting subcarrier agility to alleviate active jamming attacks in wireless networks. Mobile Computing","author":"Fathy A.","year":"2015","journal-title":"IEEE Transactions on, PP(99):1--1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385852"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530779"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073772"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998420"},{"key":"e_1_3_2_1_12_1","article-title":"Time-delayed broadcasting for defeating inside jammers. Dependable and Secure Computing","author":"Liu S.","year":"2014","journal-title":"IEEE Transactions on, (99):1--1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833639"},{"key":"e_1_3_2_1_14_1","first-page":"231","volume-title":"USENIX","author":"P\u00f6pper C.","year":"2009"},{"issue":"2","key":"e_1_3_2_1_15_1","first-page":"524","article-title":"Experimental characterization and modeling of RF jamming attacks on vanets. Vehicular Technology","volume":"64","author":"Punal O.","year":"2015","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062185"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.916"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New York New York","acronym":"WiSec'15"},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":18,"alternative-id":["10.1145\/2766498.2766515","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766515","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}