{"id":"https://openalex.org/W2783892643","doi":"https://doi.org/10.1109/allerton.2017.8262745","title":"Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks","display_name":"Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2783892643","doi":"https://doi.org/10.1109/allerton.2017.8262745","mag":"2783892643"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2017.8262745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2017.8262745","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://stars.library.ucf.edu/scopus2015/7103","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109171008","display_name":"Ahmed H. Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed H. Anwar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003612688","display_name":"George Atia","orcid":"https://orcid.org/0000-0001-7958-9855"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Atia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071514799","display_name":"Mina Guirguis","orcid":"https://orcid.org/0000-0003-2629-6172"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mina Guirguis","raw_affiliation_strings":["Department of Computer Science, Texas State University, San Marcos, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas State University, San Marcos, TX","institution_ids":["https://openalex.org/I13511017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109171008"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.8749,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79259358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"252","last_page":"258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.851468026638031},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7453015446662903},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6787425875663757},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6406441926956177},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5853821635246277},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5520336627960205},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5518872141838074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5248448848724365},{"id":"https://openalex.org/keywords/zero-sum-game","display_name":"Zero-sum game","score":0.5051277279853821},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5007679462432861},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4876776933670044},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.44842416048049927},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4471122920513153},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.44615936279296875},{"id":"https://openalex.org/keywords/state-space","display_name":"State space","score":0.4323028326034546},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3910868167877197},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15961945056915283},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15828624367713928},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.1478463113307953},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13900145888328552},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.12154954671859741}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.851468026638031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7453015446662903},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6787425875663757},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6406441926956177},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5853821635246277},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5520336627960205},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5518872141838074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5248448848724365},{"id":"https://openalex.org/C136356330","wikidata":"https://www.wikidata.org/wiki/Q156612","display_name":"Zero-sum game","level":3,"score":0.5051277279853821},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5007679462432861},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4876776933670044},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.44842416048049927},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4471122920513153},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.44615936279296875},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.4323028326034546},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3910868167877197},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15961945056915283},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15828624367713928},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.1478463113307953},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13900145888328552},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.12154954671859741},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/allerton.2017.8262745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2017.8262745","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-8102","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/7103","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-8102","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/7103","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"},"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1528676759","https://openalex.org/W1542941925","https://openalex.org/W1590488181","https://openalex.org/W1991113998","https://openalex.org/W1993658504","https://openalex.org/W2020380853","https://openalex.org/W2038285513","https://openalex.org/W2065483835","https://openalex.org/W2087127181","https://openalex.org/W2098432798","https://openalex.org/W2101596611","https://openalex.org/W2107831657","https://openalex.org/W2121863487","https://openalex.org/W2144369278","https://openalex.org/W2156288624","https://openalex.org/W2158320967","https://openalex.org/W2159629200","https://openalex.org/W2168078104","https://openalex.org/W2168079492","https://openalex.org/W2220128279","https://openalex.org/W2498477478","https://openalex.org/W2534481600","https://openalex.org/W2588866187","https://openalex.org/W2727450595","https://openalex.org/W4214717370","https://openalex.org/W4252284432","https://openalex.org/W6635205284","https://openalex.org/W6674892317"],"related_works":["https://openalex.org/W3011680666","https://openalex.org/W3136378956","https://openalex.org/W4287871712","https://openalex.org/W3006995042","https://openalex.org/W3004964213","https://openalex.org/W2885522335","https://openalex.org/W2128266000","https://openalex.org/W2763487920","https://openalex.org/W4400976564","https://openalex.org/W2388876321"],"abstract_inverted_index":{"This":[0],"paper":[1],"develops":[2],"a":[3,14,19,25,31,98],"game-theoretic":[4],"defense":[5,146],"approach":[6],"against":[7,152],"jamming":[8,49],"attacks":[9],"targeting":[10],"access":[11],"points":[12],"in":[13,35,56],"wireless":[15],"network.":[16,58],"We":[17,87],"formulate":[18],"two-player":[20],"zero-sum":[21],"stochastic":[22],"game":[23],"between":[24,64,78],"network":[26,85],"administrator":[27],"(the":[28,33],"defender)":[29],"and":[30,73,77,83,140,148],"jammer":[32],"attacker)":[34],"which":[36],"the":[37,40,44,48,57,65,68,74,80,104,124,134,142,145,149],"defender":[38],"adapts":[39],"RF":[41],"footprints":[42],"of":[43,67,110,123,133,144],"nodes":[45],"to":[46,70,137],"counteract":[47],"attack":[50,69,75],"aimed":[51],"at":[52,94],"creating":[53],"excessive":[54],"interference":[55,81],"Our":[59],"formulation":[60],"captures":[61],"inherent":[62],"tradeoffs":[63],"ability":[66],"inflict":[71],"damage":[72],"exposure,":[76],"reducing":[79],"level":[82],"maintaining":[84],"coverage.":[86],"obtain":[88],"optimal":[89],"policies":[90,115,151],"for":[91,107],"both":[92],"players":[93],"Nash":[95],"Equilibrium":[96],"using":[97],"value-iteration":[99],"based":[100],"algorithm.":[101],"To":[102],"handle":[103],"state-space":[105],"complexity":[106],"this":[108],"class":[109],"games,":[111],"we":[112,130],"develop":[113],"approximate":[114,150],"by":[116],"judiciously":[117],"extracting":[118],"features":[119],"that":[120],"are":[121],"well-representative":[122],"different":[125],"states.":[126],"Through":[127],"numerical":[128],"results,":[129],"show":[131],"convergence":[132],"used":[135],"algorithm":[136],"stationary":[138],"policies,":[139],"demonstrate":[141],"effectiveness":[143],"mechanism":[147],"such":[153],"attacks.":[154]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
