{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:36:02Z","timestamp":1764570962012,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1650831"],"award-info":[{"award-number":["1650831"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469038","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning Model for Cyber-attack Index Based Virtual Wireless Network Selection"],"prefix":"10.1145","author":[{"given":"Naveen","family":"Sapavath","sequence":"first","affiliation":[{"name":"Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208684"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5493875"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2416987"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"e_1_3_2_1_5_1","volume-title":"Denial of service attacks in wireless networks: The case of jammers","author":"Pelechrinis Konstantinos","year":"2010","unstructured":"Konstantinos Pelechrinis , Marios Iliofotou , and Srikanth V Krishnamurthy . 2010. Denial of service attacks in wireless networks: The case of jammers . IEEE Communications surveys & tutorials 13, 2 ( 2010 ), 245--257. Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth V Krishnamurthy. 2010. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications surveys & tutorials 13, 2 (2010), 245--257."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874884"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363377"},{"key":"e_1_3_2_1_8_1","volume-title":"Wireless network virtualization for enhancing security: Status, challenges and perspectives","author":"Rawat Danda B","year":"2016","unstructured":"Danda B Rawat and Nimish Sharma . 2016. Wireless network virtualization for enhancing security: Status, challenges and perspectives . In IEEE SoutheastCon 2016 . 1--8. Danda B Rawat and Nimish Sharma. 2016. Wireless network virtualization for enhancing security: Status, challenges and perspectives. In IEEE SoutheastCon 2016. 1--8."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2347048"},{"volume-title":"Dynamic spectrum access for wireless networks","author":"Rawat Danda B","key":"e_1_3_2_1_10_1","unstructured":"Danda B Rawat , Min Song , and Sachin Shetty . 2015. Dynamic spectrum access for wireless networks . Springer . Danda B Rawat, Min Song, and Sachin Shetty. 2015. Dynamic spectrum access for wireless networks. Springer."},{"key":"e_1_3_2_1_11_1","volume-title":"Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. In 2019 International Conference on Computing, Networking and Communications (ICNC). 131--135","author":"Sapavath Naveen Naik","year":"2019","unstructured":"Naveen Naik Sapavath , Dema Saad Alorini , Danda B Rawat , and Moses Garuba . 2019 . Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. In 2019 International Conference on Computing, Networking and Communications (ICNC). 131--135 . Naveen Naik Sapavath, Dema Saad Alorini, Danda B Rawat, and Moses Garuba. 2019. Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. In 2019 International Conference on Computing, Networking and Communications (ICNC). 131--135."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2942542"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3713"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907072"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4605-5"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3468218.3469038","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469038","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":15,"alternative-id":["10.1145\/3468218.3469038","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469038","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}