{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:30Z","timestamp":1750308690208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3326300","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"300-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RF based entropy sources for jamming resilience"],"prefix":"10.1145","author":[{"given":"Jay","family":"Prakash","sequence":"first","affiliation":[{"name":"SUTD, Singapore"}]},{"given":"Chenxi","family":"Liu","sequence":"additional","affiliation":[{"name":"SUTD, Singapore"}]},{"given":"Tony Q. S.","family":"Quek","sequence":"additional","affiliation":[{"name":"SUTD, Singapore"}]},{"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[{"name":"DGIST, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"volume-title":"Proc. IEEE QRS-C. 341--347","author":"Adepu S.","key":"e_1_3_2_1_1_1","unstructured":"S. Adepu , J. Prakash , and A. Mathur . 2017. WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System . In Proc. IEEE QRS-C. 341--347 . S. Adepu, J. Prakash, and A. Mathur. 2017. WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. In Proc. IEEE QRS-C. 341--347."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"volume-title":"Proc. IEEE INFOCOM. 1--9.","author":"Liu Y.","key":"e_1_3_2_1_3_1","unstructured":"Y. Liu , P. Ning , H. Dai , and A. Liu . 2010. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication . In Proc. IEEE INFOCOM. 1--9. Y. Liu, P. Ning, H. Dai, and A. Liu. 2010. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. In Proc. IEEE INFOCOM. 1--9."},{"volume-title":"Proc. USENIX Security Symposium. 231--248","author":"Popper C.","key":"e_1_3_2_1_4_1","unstructured":"C. Popper , M. Strasser , and S. Capkun . 2009. Jamming- resistant broadcast communication without shared keys . In Proc. USENIX Security Symposium. 231--248 . C. Popper, M. Strasser, and S. Capkun. 2009. Jamming- resistant broadcast communication without shared keys. In Proc. USENIX Security Symposium. 231--248."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326300"}},"subtitle":["poster"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":5,"alternative-id":["10.1145\/3317549.3326300","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3326300","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}