{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T15:41:51Z","timestamp":1720280511438},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.comcom.2024.01.012","type":"journal-article","created":{"date-parts":[[2024,1,21]],"date-time":"2024-01-21T00:06:15Z","timestamp":1705795575000},"page":"238-250","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers"],"prefix":"10.1016","volume":"216","author":[{"given":"Tran Manh","family":"Hoang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4532-5493","authenticated-orcid":false,"given":"Ba Cao","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Huu Minh","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1448-8882","authenticated-orcid":false,"given":"Phuong T.","family":"Tran","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.comcom.2024.01.012_b1","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/COMST.2020.2977845","article-title":"NOMA-assisted machine-type communications in UDN: State-of-the-art and challenges","volume":"22","author":"Elbayoumi","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"12","key":"10.1016\/j.comcom.2024.01.012_b2","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/JPROC.2017.2768666","article-title":"Nonorthogonal multiple access for 5G and beyond","volume":"105","author":"Liu","year":"2017","journal-title":"Proc. IEEE"},{"issue":"12","key":"10.1016\/j.comcom.2024.01.012_b3","doi-asserted-by":"crossref","first-page":"2667","DOI":"10.1109\/JSAC.2017.2726718","article-title":"Non-orthogonal multiple access in large-scale heterogeneous networks","volume":"35","author":"Liu","year":"2017","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"15","key":"10.1016\/j.comcom.2024.01.012_b4","doi-asserted-by":"crossref","first-page":"3327","DOI":"10.3390\/s19153327","article-title":"On the performance of energy harvesting non-orthogonal multiple access relaying system with imperfect channel state information over Rayleigh fading channels","volume":"19","author":"Hoang","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.comcom.2024.01.012_b5","series-title":"International Conference on Industrial Networks and Intelligent Systems","first-page":"3","article-title":"Outage analysis of MIMO-NOMA relay system with user clustering and beamforming under imperfect CSI in Nakagami-m fading channels","author":"Hoang","year":"2019"},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b6","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1109\/LCOMM.2021.3052936","article-title":"Backscatter-enabled NOMA for future 6G systems: A new optimization framework under imperfect SIC","volume":"25","author":"Khan","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2024.01.012_b7","doi-asserted-by":"crossref","unstructured":"J. Barros, M. Rodrigues, Secrecy Capacity of Wireless Channels, in: Proc. of the 2006 IEEE International Symposium on Information Theory, 2006, pp. 356\u2013360.","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"10","key":"10.1016\/j.comcom.2024.01.012_b8","doi-asserted-by":"crossref","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","article-title":"On the secrecy capacity of fading channels","volume":"54","author":"Gopala","year":"2008","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"10.1016\/j.comcom.2024.01.012_b9","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"issue":"8","key":"10.1016\/j.comcom.2024.01.012_b10","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"issue":"3","key":"10.1016\/j.comcom.2024.01.012_b11","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast channels with confidential messages","volume":"24","author":"Csiszar","year":"1978","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"9","key":"10.1016\/j.comcom.2024.01.012_b12","doi-asserted-by":"crossref","first-page":"8781","DOI":"10.1109\/TVT.2021.3081589","article-title":"Secrecy analysis in NOMA full-duplex relaying networks with artificial jamming","volume":"70","author":"Li","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2024.01.012_b13","series-title":"2020 International Conference on Wireless Communications and Signal Processing","first-page":"648","article-title":"Secrecy performance analysis of noma-based integrated satellite-terrestrial relay networks with multiple colluding eavesdroppers","author":"Guo","year":"2020"},{"issue":"7","key":"10.1016\/j.comcom.2024.01.012_b14","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1109\/LWC.2021.3070429","article-title":"Secrecy outage performance analysis of cooperative NOMA networks with SWIPT","volume":"10","author":"Lei","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2024.01.012_b15","doi-asserted-by":"crossref","unstructured":"B. ElHalawany, K. Wu, Physical-Layer Security of NOMA Systems Under Untrusted Users, in: 2018 IEEE Global Communications Conference, GLOBECOM, 2018, pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2018.8647889"},{"issue":"9","key":"10.1016\/j.comcom.2024.01.012_b16","doi-asserted-by":"crossref","first-page":"5747","DOI":"10.1109\/TCOMM.2020.3003665","article-title":"On the security enhancement of uplink NOMA systems with jammer selection","volume":"68","author":"Cao","year":"2020","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/j.comcom.2024.01.012_b17","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TCOMM.2018.2873690","article-title":"Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks","volume":"67","author":"Li","year":"2019","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"10.1016\/j.comcom.2024.01.012_b18","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1109\/LCOMM.2021.3063673","article-title":"On the performance of secure underlay cognitive radio networks with energy harvesting and dual-antenna selection","volume":"25","author":"Khoshafa","year":"2021","journal-title":"IEEE Commun. Lett."},{"issue":"8","key":"10.1016\/j.comcom.2024.01.012_b19","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/LWC.2020.2986443","article-title":"Security provisioning for non-orthogonal multiple access networks with limited feedback","volume":"9","author":"Wang","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2024.01.012_b20","doi-asserted-by":"crossref","first-page":"15072","DOI":"10.1109\/ACCESS.2020.2966822","article-title":"Jamming-aided secrecy performance in secure uplink NOMA system","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"issue":"9","key":"10.1016\/j.comcom.2024.01.012_b21","doi-asserted-by":"crossref","first-page":"6282","DOI":"10.1109\/TCOMM.2019.2916070","article-title":"Secrecy outage analysis for cooperative NOMA systems with relay selection schemes","volume":"67","author":"Lei","year":"2019","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"10.1016\/j.comcom.2024.01.012_b22","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1109\/TGCN.2020.2999815","article-title":"Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection","volume":"4","author":"Salem","year":"2020","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.comcom.2024.01.012_b23","doi-asserted-by":"crossref","first-page":"2930","DOI":"10.1109\/TIFS.2020.2980202","article-title":"Secure transmission designs for NOMA systems against internal and external eavesdropping","volume":"15","author":"Cao","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10.1016\/j.comcom.2024.01.012_b24","doi-asserted-by":"crossref","first-page":"12985","DOI":"10.1109\/TVT.2021.3123134","article-title":"Secrecy outage performance of FD-NOMA relay system with multiple non-colluding eavesdroppers","volume":"70","author":"Hoang","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2024.01.012_b25","doi-asserted-by":"crossref","first-page":"79866","DOI":"10.1109\/ACCESS.2019.2923450","article-title":"Secrecy outage performance analysis for cooperative NOMA over Nakagami-m channel","volume":"7","author":"Yu","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.comcom.2024.01.012_b26","doi-asserted-by":"crossref","first-page":"4503","DOI":"10.1109\/TVT.2020.2973726","article-title":"Secure outage analysis for cooperative NOMA systems with antenna selection","volume":"69","author":"Pei","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.comcom.2024.01.012_b27","doi-asserted-by":"crossref","first-page":"2378","DOI":"10.1109\/TVT.2021.3058262","article-title":"Secrecy analysis of relay-user selection in AS-AF systems over Nakagami fading channels","volume":"70","author":"Lee","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"10.1016\/j.comcom.2024.01.012_b28","doi-asserted-by":"crossref","first-page":"10409","DOI":"10.1109\/TVT.2021.3106661","article-title":"Secrecy performance for full-duplex jamming-aided uplink noma system","volume":"70","author":"Jiang","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"10.1016\/j.comcom.2024.01.012_b29","doi-asserted-by":"crossref","first-page":"2682","DOI":"10.1109\/LCOMM.2020.3019960","article-title":"Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming","volume":"24","author":"He","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2024.01.012_b30","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/TIFS.2021.3131028","article-title":"On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach","volume":"17","author":"Ragheb","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"10.1016\/j.comcom.2024.01.012_b31","doi-asserted-by":"crossref","first-page":"11756","DOI":"10.1109\/TVT.2022.3192042","article-title":"Rate-splitting multiple access-enabled security analysis in cognitive satellite terrestrial networks","volume":"71","author":"Li","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.comcom.2024.01.012_b32","doi-asserted-by":"crossref","first-page":"11157","DOI":"10.1109\/JIOT.2020.2995609","article-title":"Secure transmission in a NOMA-assisted IoT network with diversified communication requirements","volume":"7","author":"Xiang","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.comcom.2024.01.012_b33","doi-asserted-by":"crossref","first-page":"5108","DOI":"10.1109\/JIOT.2021.3109943","article-title":"Enhancing secrecy performance of cooperative NOMA-based IoT networks via multiantenna-aided artificial noise","volume":"9","author":"Ruby","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"19","key":"10.1016\/j.comcom.2024.01.012_b34","doi-asserted-by":"crossref","first-page":"19030","DOI":"10.1109\/JSEN.2022.3199540","article-title":"Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks","volume":"22","author":"Rauniyar","year":"2022","journal-title":"IEEE Sens. J."},{"issue":"9","key":"10.1016\/j.comcom.2024.01.012_b35","doi-asserted-by":"crossref","first-page":"3450","DOI":"10.1109\/TWC.2007.06020050","article-title":"Cooperative communications with outage-optimal opportunistic relaying","volume":"6","author":"Bletsas","year":"2007","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b36","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TCOMM.2012.032012.110430","article-title":"Amplify-and-forward relay selection with outdated channel estimates","volume":"60","author":"Michalopoulos","year":"2012","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/j.comcom.2024.01.012_b37","doi-asserted-by":"crossref","first-page":"2785","DOI":"10.1109\/TVT.2020.2964809","article-title":"Outage analysis of RF energy harvesting cooperative communication systems over Nakagami-m fading channels with integer and non-integer m","volume":"69","author":"Hoang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b38","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/MWC.2019.1800598","article-title":"Non-orthogonal multiple access: Common myths and critical questions","volume":"26","author":"Vaezi","year":"2019","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"10.1016\/j.comcom.2024.01.012_b39","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/MCOM.2017.1500657CM","article-title":"Application of non-orthogonal multiple access in LTE and 5G networks","volume":"55","author":"Ding","year":"2017","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b40","doi-asserted-by":"crossref","first-page":"4615","DOI":"10.1109\/TVT.2021.3071338","article-title":"Performance analysis of NOMA-based underlay cognitive radio networks with partial\u00a1? brk?\u00bf relay selection","volume":"70","author":"Aswathi","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.comcom.2024.01.012_b41","doi-asserted-by":"crossref","first-page":"2539","DOI":"10.1109\/TCOMM.2018.2884476","article-title":"On the design of massive non-orthogonal multiple access with imperfect successive interference cancellation","volume":"67","author":"Chen","year":"2018","journal-title":"IEEE Trans. Commun."},{"issue":"8","key":"10.1016\/j.comcom.2024.01.012_b42","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1109\/LCOMM.2018.2803809","article-title":"Forwarding strategy selection in dual-hop NOMA relaying systems","volume":"22","author":"Xiao","year":"2018","journal-title":"IEEE Commun. Lett."},{"issue":"8","key":"10.1016\/j.comcom.2024.01.012_b43","first-page":"3294","article-title":"Spatially random relay selection for full\/half-duplex cooperative NOMA networks","volume":"66","author":"Yue","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"10.1016\/j.comcom.2024.01.012_b44","doi-asserted-by":"crossref","first-page":"7824","DOI":"10.1109\/TCOMM.2020.3021139","article-title":"On secure downlink NOMA systems with outage constraint","volume":"68","author":"Lei","year":"2020","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b45","doi-asserted-by":"crossref","first-page":"4645","DOI":"10.1109\/TVT.2017.2789223","article-title":"Physical layer security for cooperative NOMA systems","volume":"67","author":"Chen","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.comcom.2024.01.012_b46","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TWC.2010.112310.101008","article-title":"Secure wireless network connectivity with multi-antenna transmission","volume":"10","author":"Zhou","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b47","doi-asserted-by":"crossref","first-page":"2931","DOI":"10.1109\/TWC.2014.041014.131101","article-title":"Secrecy rates in broadcast channels with confidential messages and external eavesdroppers","volume":"13","author":"Geraci","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"10.1016\/j.comcom.2024.01.012_b48","doi-asserted-by":"crossref","first-page":"9775","DOI":"10.1109\/TVT.2018.2864542","article-title":"Robust secure beamforming in mimo wiretap channels with deterministically bounded channel errors","volume":"67","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.comcom.2024.01.012_b49","doi-asserted-by":"crossref","first-page":"3883","DOI":"10.1109\/TVT.2022.3144531","article-title":"Security at physical layer in noma relaying networks with cooperative jamming","volume":"71","author":"Chen","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b50","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1109\/TCOMM.2015.2409171","article-title":"Outage constrained secrecy throughput maximization for DF relay networks","volume":"63","author":"Zheng","year":"2015","journal-title":"IEEE Trans. Commun."},{"issue":"8","key":"10.1016\/j.comcom.2024.01.012_b51","doi-asserted-by":"crossref","first-page":"10173","DOI":"10.1109\/TVT.2023.3254643","article-title":"Secrecy performance analysis for MIMO-DF relay systems with MRT\/MRC and TZF\/MRC schemes","volume":"72","author":"Hoang","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"10.1016\/j.comcom.2024.01.012_b52","doi-asserted-by":"crossref","first-page":"7168","DOI":"10.1109\/TCOMM.2019.2926719","article-title":"Secrecy analysis in DF relay over generalized-K fading channels","volume":"67","author":"Zhao","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"10.1016\/j.comcom.2024.01.012_b53","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1109\/LCOMM.2017.2653777","article-title":"Exploiting non-orthogonal multiple access in cooperative relay sharing","volume":"21","author":"Kader","year":"2017","journal-title":"IEEE Commun. Lett."},{"issue":"11","key":"10.1016\/j.comcom.2024.01.012_b54","doi-asserted-by":"crossref","first-page":"2037","DOI":"10.1109\/LCOMM.2015.2474856","article-title":"Non-orthogonal multiple access in coordinated direct and relay transmission","volume":"19","author":"Kim","year":"2015","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"10.1016\/j.comcom.2024.01.012_b55","doi-asserted-by":"crossref","first-page":"2413","DOI":"10.1109\/JSAC.2017.2725879","article-title":"Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster","volume":"35","author":"Zeng","year":"2017","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"4","key":"10.1016\/j.comcom.2024.01.012_b56","doi-asserted-by":"crossref","first-page":"6441","DOI":"10.1109\/JIOT.2019.2907574","article-title":"Physical layer security enhancement for internet of things in the presence of co-channel interference and multiple eavesdroppers","volume":"6","author":"Ssettumba","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2024.01.012_b57","series-title":"Handbook of Mathematical Functions: with Formulas, Graphs, and Mathematical Tables, Vol. 55","author":"Abramowitz","year":"1964"},{"issue":"2","key":"10.1016\/j.comcom.2024.01.012_b58","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1109\/TWC.2021.3103499","article-title":"Stochastic geometry-based analysis of cache-enabled hybrid satellite-aerial-terrestrial networks with non-orthogonal multiple access","volume":"21","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366424000124?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366424000124?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T11:54:16Z","timestamp":1705924456000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366424000124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":58,"alternative-id":["S0140366424000124"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2024.01.012","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2024.01.012","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}