{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:30:54Z","timestamp":1761676254937},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-6180-2014-171","type":"journal-article","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T04:02:10Z","timestamp":1417579330000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Intelligent cognitive radio jamming - a game-theoretical approach"],"prefix":"10.1186","volume":"2014","author":[{"given":"Kresimir","family":"Dabcevic","sequence":"first","affiliation":[]},{"given":"Alejandro","family":"Betancourt","sequence":"additional","affiliation":[]},{"given":"Lucio","family":"Marcenaro","sequence":"additional","affiliation":[]},{"given":"Carlo S","family":"Regazzoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,3]]},"reference":[{"key":"722_CR1","doi-asserted-by":"crossref","unstructured":"Mitola J, Maguire GQ Jr: Cognitive radio: making software radios more personal. IEEE Pers. Comm 6(4):1999. doi:10.1109\/98.788210","DOI":"10.1109\/98.788210"},{"issue":"1","key":"722_CR2","doi-asserted-by":"crossref","first-page":"381465","DOI":"10.1155\/2010\/381465","volume":"2010","author":"Y Zeng","year":"2010","unstructured":"Zeng Y, Liang Y-C, Hoang A, Zhang R: A review on spectrum sensing for cognitive radio: challenges and solutions. EURASIP J. Adv Signal Process 2010, 2010(1):381465. doi:10.1155\/2010\/381465","journal-title":"EURASIP J. Adv Signal Process"},{"key":"722_CR3","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/NGMAST.2013.47","volume-title":"Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013 Seventh International Conference On","author":"MO Mughal","year":"2013","unstructured":"Mughal MO, Razi A, Alam SS, Marcenaro L, Regazzoni CS: Analysis of energy detector in cooperative relay networks for cognitive radios. In Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013 Seventh International Conference On. IEEE, Prague, Czech Republic; 2013:220-225. doi:10.1109\/NGMAST.2013.47"},{"key":"722_CR4","volume-title":"Communication Systems and Network Technologies (CSNT), 2011 International Conference on","author":"S Kapoor","year":"580","unstructured":"Kapoor S, Rao SVRK, Singh G: Opportunistic spectrum sensing by employing matched filter in cognitive radio network. In Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, Jammu, India; 580. doi:10.1109\/CSNT.2011.124"},{"issue":"1","key":"722_CR5","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.aeue.2011.05.004","volume":"66","author":"L Yang","year":"2012","unstructured":"Yang L, Chen Z, Yin F: Cyclo-energy detector for spectrum sensing in cognitive radio. Int. J. Electron. Commun 2012, 66(1):89-92. doi:10.1016\/j.aeue.2011.05.004 10.1016\/j.aeue.2011.05.004","journal-title":"Int. J. Electron. Commun"},{"key":"722_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/AICT.2010.42","volume-title":"Telecommunications (AICT), 2010 Sixth Advanced International Conference on","author":"Z Khalaf","year":"2010","unstructured":"Khalaf Z, Nafkha A, Palicot J, Ghozzi M: Hybrid spectrum sensing architecture for cognitive radio equipment. In Telecommunications (AICT), 2010 Sixth Advanced International Conference on. IEEE, Barcelona, Spain; 2010:46-51. doi:10.1109\/AICT.2010.42"},{"key":"722_CR7","first-page":"2070","volume-title":"Ultra Modern Telecommunications & Workshops, 2009. ICUMT\u201909. International Conference on","author":"M Nekovee","year":"2009","unstructured":"Nekovee M: A survey of cognitive radio access to TV White Spaces. In Ultra Modern Telecommunications & Workshops, 2009. ICUMT\u201909. International Conference on. Russia IEEE, St. Petersburg; 2009:2070-2077. doi:10.1155\/2010\/236568"},{"issue":"2","key":"722_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TBC.2008.917737","volume":"54","author":"Z Lei","year":"2008","unstructured":"Lei Z, Chin F: A reliable and power efficient beacon structure for cognitive radio systems. IEEE Trans. Broadcast 2008, 54(2):182-187. doi:10.1109\/TBC.2008.917737","journal-title":"IEEE Trans. Broadcast"},{"key":"722_CR9","doi-asserted-by":"publisher","first-page":"301","DOI":"10.4018\/978-1-4666-4189-1.ch013","volume-title":"Evolution of Cognitive Networks and Self-Adaptive Communication Systems","author":"K Dabcevic","year":"2013","unstructured":"Dabcevic K, Marcenaro L, Regazzoni CS: Security in cognitive radio networks. In Evolution of Cognitive Networks and Self-Adaptive Communication Systems. Edited by: Lagkas TD, Sarigiannidis P, Louta M, Chatzimisios P. IGI Global Hershey; 2013:301-333."},{"issue":"1","key":"722_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1186\/1687-1499-2013-215","volume":"2013","author":"J Blesa","year":"2013","unstructured":"Blesa J, Romero E, Rozas A, Araujo A: Pue attack detection in cwsns using anomaly detection techniques. EURASIP J. Wireless Commun. Netw 2013, 2013(1):215. doi:10.1186\/1687-1499-2013-215 10.1186\/1687-1499-2013-215","journal-title":"EURASIP J. Wireless Commun. Netw"},{"key":"722_CR11","first-page":"168","volume-title":"Communication Systems and Networks (COMSNETS), 2010 Second International Conference On","author":"P Anand","year":"2010","unstructured":"Anand P, Rawat AS, Hao C, Varshney PK: Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. In Communication Systems and Networks (COMSNETS), 2010 Second International Conference On. IEEE, Bangalore, India; 2010:168-176. doi:10.1109\/COMSNETS.2010.5432012"},{"issue":"1","key":"722_CR12","doi-asserted-by":"crossref","first-page":"695750","DOI":"10.1155\/2010\/695750","volume":"2010","author":"W Wang","year":"2010","unstructured":"Wang W, Li H, Sun YL, Han Z: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process 2010, 2010(1):695750. doi:10.1155\/2010\/695750","journal-title":"EURASIP J. Adv. Signal Process"},{"issue":"1","key":"722_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1186\/1687-6180-2013-169","volume":"2013","author":"J Zhu","year":"2013","unstructured":"Zhu J: Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack. EURASIP J. Adv. Signal Process 2013, 2013(1):169. doi:10.1186\/1687-6180-2013-169 10.1186\/1687-6180-2013-169","journal-title":"EURASIP J. Adv. Signal Process"},{"issue":"3","key":"722_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2013.6523802","volume":"27","author":"RD Pietro","year":"2013","unstructured":"Pietro RD, Oligeri G: Jamming mitigation in cognitive radio networks. IEEE Netw 2013, 27(3):10-15. doi:10.1109\/MNET.2013.6523802","journal-title":"IEEE Netw"},{"key":"722_CR15","first-page":"139","volume-title":"Complexity in Engineering (COMPENG), 2012","author":"P Morerio","year":"2012","unstructured":"Morerio P, Dabcevic K, Marcenaro L, Regazzoni CS: Distributed cognitive radio architecture with automatic frequency switching. In Complexity in Engineering (COMPENG), 2012. IEEE, Aachen, Germany; 2012:139-142. doi:10.1109\/CompEng.2012.6242968"},{"key":"722_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72709-5_1","volume-title":"Proceedings of the 1st EuroFGI International Conference on Network Control and Optimization, NET-COOP\u201907","author":"E Altman","year":"2007","unstructured":"Altman E, Avrachenkov K, Garnaev A: A jamming game in wireless networks with transmission cost. In Proceedings of the 1st EuroFGI International Conference on Network Control and Optimization, NET-COOP\u201907. Springer, Berlin, Heidelberg; 2007:1-12."},{"issue":"4","key":"722_CR17","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/JSAC.2011.110418","volume":"29","author":"B Wang","year":"2011","unstructured":"Wang B, Wu Y, Liu KJR, Clancy TC: An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Area Comm 2011, 29(4):877-889. doi:10.1109\/JSAC.2011.110418","journal-title":"IEEE J. Sel. Area Comm"},{"issue":"3","key":"722_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MNET.2013.6523804","volume":"27","author":"C Chen","year":"2013","unstructured":"Chen C, Song M, Xin C, Backens J: A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw 2013, 27(3):22-27. doi:10.1109\/MNET.2013.6523804","journal-title":"IEEE Netw"},{"issue":"2","key":"722_CR19","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TNET.2011.2170092","volume":"20","author":"N Buchbinder","year":"2012","unstructured":"Buchbinder N, Lewin-Eytan L, Menache I, Naor J, Orda A: Dynamic power allocation under arbitrary varying channels: an online approach. IEEE\/ACM Trans. Netw 2012, 20(2):477-487. doi:10.1109\/TNET.2011.2170092","journal-title":"IEEE\/ACM Trans. Netw"},{"key":"722_CR20","first-page":"41","volume-title":"Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) 2012 10th International Symposium On","author":"A Garnaev","year":"2012","unstructured":"Garnaev A, Hayel Y, Altman E: A bayesian jamming game in an ofdm wireless network. In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) 2012 10th International Symposium On. IEEE, Paderborn, Germany; 2012:41-48."},{"key":"722_CR21","doi-asserted-by":"publisher","first-page":"8158","DOI":"10.1109\/ICASSP.2014.6855191","volume-title":"Acoustics, Speech and Signal Processing (ICASSP) 2014 IEEE International Conference On","author":"K Dabcevic","year":"2014","unstructured":"Dabcevic K, Betancourt A, Marcenaro L, Regazzoni CS: A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios. In Acoustics, Speech and Signal Processing (ICASSP) 2014 IEEE International Conference On. IEEE, Florence, Italy; 2014:8158-8162. doi:10.1109\/ICASSP.2014.6855191"},{"issue":"2","key":"722_CR22","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/BF01769259","volume":"10","author":"JF Mertens","year":"1981","unstructured":"Mertens JF, Neyman A: Stochastic games. Int. J. Game Theor 1981, 10(2):53-66. doi:10.1007\/BF01769259 10.1007\/BF01769259","journal-title":"Int. J. Game Theor"},{"issue":"2","key":"722_CR23","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash J: Non-cooperative games. Ann. Math 1951, 54(2):286-295. 10.2307\/1969529","journal-title":"Ann. Math"},{"key":"722_CR24","volume-title":"Game Theory","author":"G Owen","year":"1995","unstructured":"Owen G: Game Theory. Academic Press, San Diego; 1995."},{"issue":"1","key":"722_CR25","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BF01456931","volume":"71","author":"LEJ Brouwer","year":"1911","unstructured":"Brouwer LEJ: \u00dcber abbildung von mannigfaltigkeiten. Mathematische Annalen 1911, 71(1):97-115. 10.1007\/BF01456931","journal-title":"Mathematische Annalen"},{"key":"722_CR26","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BFb0121248","volume-title":"Pivoting and Extension. Mathematical Programming Studies, vol. 1.","author":"LS Shapley","year":"1974","unstructured":"Shapley LS: A note on the Lemke-Howson algorithm. In Pivoting and Extension. Mathematical Programming Studies, vol. 1.. Edited by: Balinski ML. Springer Berlin, Heidelberg; 1974:175-189. doi:10.1007\/BFb0121248"},{"key":"722_CR27","volume-title":"Gambit: Software Tools for Game Theory, Version 13.1.2","author":"RD McKelvey","year":"2014","unstructured":"McKelvey RD, McLennan AM, Turocy TL: Gambit: Software Tools for Game Theory, Version 13.1.2. 2014.\n                    http:\/\/www.gambit-project.org"},{"key":"722_CR28","first-page":"1723","volume-title":"Chapter 45 Computing equilibria for two-person games. Handbook of Game Theory with Economic Applications","author":"BV Stengel","year":"2002","unstructured":"Stengel BV: Chapter 45 Computing equilibria for two-person games. Handbook of Game Theory with Economic Applications. Elsevier; 2002:1723-1759."},{"issue":"4","key":"722_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/PL00009438","volume":"21","author":"B Von Stengel","year":"1999","unstructured":"Von Stengel B: New maximal numbers of equilibria in bimatrix games. Discrete Comput. Geom 1999, 21(4):557-568. 10.1007\/PL00009438","journal-title":"Discrete Comput. Geom"},{"issue":"2","key":"722_CR30","first-page":"65","volume":"18","author":"I Milchtaich","year":"2008","unstructured":"Milchtaich I, Ostrowski T: On some saddle point matrices and applications to completely mixed equilibrium in bimatrix games. Int. J. Math. Game Theory Algebra 2008, 18(2):65-72.","journal-title":"Int. J. Math. Game Theory Algebra"},{"issue":"3","key":"722_CR31","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TAC.2005.843878","volume":"50","author":"JS Shamma","year":"2005","unstructured":"Shamma JS, Arslan G: Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria. IEEE Trans. Automat. Contr 2005, 50(3):312-327. doi:10.1109\/TAC.2005.843878","journal-title":"IEEE Trans. Automat. Contr"},{"key":"722_CR32","volume-title":"Introduction to Reinforcement Learning","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG: Introduction to Reinforcement Learning. MIT Press, Cambridge; 1998."},{"key":"722_CR33","volume-title":"Modern Communications Jamming: Principles and Techniques. Artech House intelligence and information operations series","author":"R Poisel","year":"2011","unstructured":"Poisel R: Modern Communications Jamming: Principles and Techniques. Artech House intelligence and information operations series. Artech House, Norwood; 2011."},{"issue":"2","key":"722_CR34","doi-asserted-by":"publisher","first-page":"296","DOI":"10.2307\/1969530","volume":"54","author":"J Robinson","year":"1951","unstructured":"Robinson J: An iterative method of solving a game. Ann. Math 1951, 54(2):296-301. 10.2307\/1969530","journal-title":"Ann. Math"},{"key":"722_CR35","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1132516.1132527","volume-title":"Proceedings of the Thirty-eighth Annual ACM Symposium on Theory of Computing STOC \u201806","author":"C Daskalakis","year":"2006","unstructured":"Daskalakis C, Goldberg PW, Papadimitriou CH: The complexity of computing a nash equilibrium. In Proceedings of the Thirty-eighth Annual ACM Symposium on Theory of Computing STOC \u201806. ACM, New York; 2006:71-78. doi:10.1145\/1132516.1132527"},{"key":"722_CR36","first-page":"636","volume-title":"Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing Allerton\u201909","author":"V Conitzer","year":"2009","unstructured":"Conitzer V: Approximation guarantees for fictitious play. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing Allerton\u201909. IEEE Press, Piscataway; 2009:636-643."},{"key":"722_CR37","volume-title":"CoRR","author":"G Ostrovski","year":"2013","unstructured":"Ostrovski G, van Strien S: Payoff performance of fictitious play. CoRR 2013., abs\/1308.4049:"},{"issue":"1","key":"722_CR38","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.geb.2008.11.012","volume":"70","author":"R Cominetti","year":"2010","unstructured":"Cominetti R, Melo E, Sorin S: A payoff-based learning procedure and its application to traffic games. Game Econ. Behav 2010, 70(1):71-83. doi:10.1016\/j.geb.2008.11.012. Special Issue In Honor of Ehud Kalai 10.1016\/j.geb.2008.11.012","journal-title":"Game Econ. Behav"},{"key":"722_CR39","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-16170-4_11","volume-title":"Proceedings of the Third International Conference on Algorithmic Game Theory SAGT\u201910","author":"C Daskalakis","year":"2010","unstructured":"Daskalakis C, Frongillo R, Papadimitriou CH, Pierrakos G, Valiant G: On learning algorithms for nash equilibria. In Proceedings of the Third International Conference on Algorithmic Game Theory SAGT\u201910. Springer, Berlin, Heidelberg; 2010:114-125."},{"key":"722_CR40","first-page":"41","volume-title":"Proceedings of the 20th National Conference on Artificial Intelligence - Volume 1. AAAI\u201905","author":"B Banerjee","year":"2005","unstructured":"Banerjee B, Peng J: Efficient no-regret multiagent learning. Proceedings of the 20th National Conference on Artificial Intelligence - Volume 1. AAAI\u201905 2005, 41-46."},{"issue":"6","key":"722_CR41","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1049\/iet-spr.2011.0185","volume":"6","author":"K Wang","year":"2012","unstructured":"Wang K, Liu Q, Chen L: Optimality of greedy policy for a class of standard reward function of restless multi-armed bandit problem. IET Signal Process 2012, 6(6):584-593. doi:10.1049\/iet-spr.2011.0185 10.1049\/iet-spr.2011.0185","journal-title":"IET Signal Process"},{"key":"722_CR42","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-642-16111-7_23","volume-title":"KI 2010: Advances in Artificial Intelligence","author":"M Tokic","year":"2010","unstructured":"Tokic M: Adaptive \u03b5 -greedy exploration in reinforcement learning based on value differences. In KI 2010: Advances in Artificial Intelligence. Edited by: Dillmann R, Beyerer J, Hanebeck U, Schultz T. Springer, Karlsruhe; 2010:203-210. Lecture Notes in Computer Science"},{"key":"722_CR43","first-page":"219","volume-title":"Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems","author":"K Dabcevic","year":"2014","unstructured":"Dabcevic K, Marcenaro L, Regazzoni CS: Spd-driven smart transmission layer based on a software defined radio test bed architecture. In Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems. SciTePress, Lisbon, Portugal; 2014:219-230."},{"key":"722_CR44","volume-title":"SWAVE HH - Secure Wideband Multi-role - Single-Channel Handheld Radio","author":"SelexES","year":"2013","unstructured":"SelexES: SWAVE HH - Secure Wideband Multi-role - Single-Channel Handheld Radio. 2013.\n                    http:\/\/www.selexelsag.com\/internet\/localization\/IPC\/media\/docs\/SWave-Handheld-Radio-v1-2012Selex.pdf\n                    \n                   . Accessed: 2014-07-31"},{"key":"722_CR45","volume-title":"Proceedings of SDR\u201914 - WinnComm-Europe","author":"K Dabcevic","year":"2014","unstructured":"Dabcevic K, Mughal MO, Marcenaro L, Regazzoni CS: Spectrum intelligence for interference mitigation for cognitive radio terminals. In Proceedings of SDR\u201914 - WinnComm-Europe. Wireless Innovation Forum, Rome, Italy; 2014."},{"key":"722_CR46","volume-title":"Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum TAPAS \u201806","author":"D Cabric","year":"2006","unstructured":"Cabric D, Tkachenko A, Brodersen RW: Experimental study of spectrum sensing based on energy detection and network cooperation. In Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum TAPAS \u201806. ACM, New York; 2006. doi:10.1145\/1234388.1234400"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-171\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-171.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-171.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T01:43:00Z","timestamp":1548121380000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["722"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-171","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"16 March 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"171"}}