{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:42:24Z","timestamp":1769827344431,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Homeland Security","award":["2017- ST-062-000003."],"award-info":[{"award-number":["2017- ST-062-000003."]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1650831"],"award-info":[{"award-number":["1650831"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,7]]},"DOI":"10.1145\/3318216.3363377","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"401-406","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Performance evaluation of deception system for deceiving cyber adversaries in adaptive virtualized wireless networks"],"prefix":"10.1145","author":[{"given":"Danda B.","family":"Rawat","sequence":"first","affiliation":[{"name":"Howard University"}]},{"given":"Naveen","family":"Sapavath","sequence":"additional","affiliation":[{"name":"Howard University"}]},{"given":"Min","family":"Song","sequence":"additional","affiliation":[{"name":"Dept. of Electrical &amp; Computer Engineering, Stevens Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894841_20"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546921","volume-title":"Prediction, learning, and games","author":"Cesa-Bianchi N.","year":"2006","unstructured":"Cesa-Bianchi , N. , and Lugosi , G . Prediction, learning, and games . Cambridge university press , 2006 . Cesa-Bianchi, N., and Lugosi, G. Prediction, learning, and games. Cambridge university press, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795427"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3"},{"key":"e_1_3_2_1_5_1","volume-title":"On the generalized\" birth-and-death\" process. The annals of mathematical statistics 19, 1","author":"Kendall D. G.","year":"1948","unstructured":"Kendall , D. G. , On the generalized\" birth-and-death\" process. The annals of mathematical statistics 19, 1 ( 1948 ), 1--15. Kendall, D. G., et al. On the generalized\" birth-and-death\" process. The annals of mathematical statistics 19, 1 (1948), 1--15."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Deceiving attackers in wireless local area networks using decoys","volume":"7","author":"Kumar A. A.","year":"2018","unstructured":"Kumar , A. A. , Mohan , A. K. , and Amritha , P . Deceiving attackers in wireless local area networks using decoys . Journal of Cyber Security and Mobility 7 , 1 ( 2018 ), 201--214. Kumar, A. A., Mohan, A. K., and Amritha, P. Deceiving attackers in wireless local area networks using decoys. Journal of Cyber Security and Mobility 7, 1 (2018), 201--214.","journal-title":"Journal of Cyber Security and Mobility"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2352118"},{"key":"e_1_3_2_1_8_1","first-page":"2","article-title":"Payoff optimization through wireless network virtualization for IoT applications: A three layer game approach","volume":"6","author":"Rawat D. B.","year":"2018","unstructured":"Rawat , D. B. , Alshaikhi , A. , Alshammari , A. , Bajracharya , C. , and Song , M . Payoff optimization through wireless network virtualization for IoT applications: A three layer game approach . IEEE Internet of Things Journal 6 , 2 ( 2018 ), 2797--2805. Rawat, D. B., Alshaikhi, A., Alshammari, A., Bajracharya, C., and Song, M. Payoff optimization through wireless network virtualization for IoT applications: A three layer game approach. IEEE Internet of Things Journal 6, 2 (2018), 2797--2805.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"On the wireless virtualization with QoE constraints","volume":"30","author":"Rawat D. B.","year":"2019","unstructured":"Rawat , D. B. , Alsulami , B. S. , and Chaudhary , V . On the wireless virtualization with QoE constraints . Wiley's Transactions on Emerging Telecommunications Technologies 30 , 3 ( 2019 ), e3573. Rawat, D. B., Alsulami, B. S., and Chaudhary, V. On the wireless virtualization with QoE constraints. Wiley's Transactions on Emerging Telecommunications Technologies 30, 3 (2019), e3573.","journal-title":"Wiley's Transactions on Emerging Telecommunications Technologies"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1201\/b19290"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Challenges and Perspectives. In Proc. of the IEEE SoutheastCon 2016","author":"Rawat D. B.","year":"2016","unstructured":"Rawat , D. B. , and Sharma , N . Wireless Network Virtualization for Enhancing Security: Status , Challenges and Perspectives. In Proc. of the IEEE SoutheastCon 2016 ( 2016 ), pp. 1 -- 8 . Rawat, D. B., and Sharma, N. Wireless Network Virtualization for Enhancing Security: Status, Challenges and Perspectives. In Proc. of the IEEE SoutheastCon 2016 (2016), pp. 1--8."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2756798"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504194"}],"event":{"name":"SEC '19: The Fourth ACM\/IEEE Symposium on Edge Computing","location":"Arlington Virginia","acronym":"SEC '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318216.3363377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318216.3363377","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318216.3363377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:40Z","timestamp":1750204480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318216.3363377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":13,"alternative-id":["10.1145\/3318216.3363377","10.1145\/3318216"],"URL":"https:\/\/doi.org\/10.1145\/3318216.3363377","relation":{},"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"2019-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}