{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:20Z","timestamp":1750306100956,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National science foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3132114.3132127","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense"],"prefix":"10.1145","author":[{"given":"Ramazan","family":"Algin","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Huseyin O.","family":"Tan","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[{"name":"Florida International University, Miam, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6688027"},{"key":"e_1_3_2_1_2_1","volume-title":"Workshop on ns3","volume":"43","author":"Andreev Kirill","year":"2010","unstructured":"Kirill Andreev and Pavel Boyko . 2010 . IEEE 802.11 s mesh networking NS-3 model . In Workshop on ns3 , Vol. 43 . Kirill Andreev and Pavel Boyko. 2010. IEEE 802.11 s mesh networking NS-3 model. In Workshop on ns3, Vol. 43."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.49"},{"key":"e_1_3_2_1_5_1","volume-title":"Introduction to algorithms","author":"Cormen Thomas H.","year":"2001","unstructured":"Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest , and Clifford Stein . 2001. Introduction to algorithms second edition. ( 2001 ). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2001. Introduction to algorithms second edition. (2001)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/364520.364540"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.006"},{"key":"e_1_3_2_1_8_1","unstructured":"Ronald Aylmer Fisher Frank Yates etal 1938. Statistical tables for biological agricultural and medical research. (1938).  Ronald Aylmer Fisher Frank Yates et al. 1938. Statistical tables for biological agricultural and medical research. (1938)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.014"},{"key":"e_1_3_2_1_10_1","unstructured":"IEEE 802.11 Working Group et al. 2010. IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std 802 11 (2010).  IEEE 802.11 Working Group et al. 2010. IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE Std 802 11 (2010)."},{"key":"e_1_3_2_1_11_1","volume-title":"Carlo Cecati, and Gerhard P. Hancke","author":"Gungor Vehbi C","year":"2011","unstructured":"Vehbi C Gungor , Dilan Sahin , Taskin Kocak , Salih Ergut , Concettina Buccella , Carlo Cecati, and Gerhard P. Hancke . 2011 . Smart grid technologies: Communication technologies and standards. IEEE transactions on Industrial informatics 7, 4 (2011), 529--539. Vehbi C Gungor, Dilan Sahin, Taskin Kocak, Salih Ergut, Concettina Buccella, Carlo Cecati, and Gerhard P. Hancke. 2011. Smart grid technologies: Communication technologies and standards. IEEE transactions on Industrial informatics 7, 4 (2011), 529--539."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.89.015004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2012.00029"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.78"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.03.029"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5669"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502322"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Nico Saputro et al. 2017. Investigation of Smart Meter Data Reporting Strategies for Optimized Performance in Smart Grid AMI Networks. IEEE Internet of Things Journal (2017).  Nico Saputro et al. 2017. Investigation of Smart Meter Data Reporting Strategies for Optimized Performance in Smart Grid AMI Networks. IEEE Internet of Things Journal (2017).","DOI":"10.1109\/JIOT.2017.2701205"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007665"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.03.027"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2013.6648037"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2510504"},{"volume-title":"Foundations of Computer Science, 1984. 25th Annual Symposium on. IEEE, 458--463","author":"Vazirani Umesh V","key":"e_1_3_2_1_24_1","unstructured":"Umesh V Vazirani and Vijay V. Vazirani . 1984. Efficient and secure pseudorandom number generation . In Foundations of Computer Science, 1984. 25th Annual Symposium on. IEEE, 458--463 . Umesh V Vazirani and Vijay V. Vazirani. 1984. Efficient and secure pseudorandom number generation. In Foundations of Computer Science, 1984. 25th Annual Symposium on. IEEE, 458--463."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663486"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623770"}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132127","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":27,"alternative-id":["10.1145\/3132114.3132127","10.1145\/3132114"],"URL":"https:\/\/doi.org\/10.1145\/3132114.3132127","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}