{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T10:27:34Z","timestamp":1680258454905},"reference-count":31,"publisher":"Institution of Engineering and Technology (IET)","issue":"15","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001429","name":"Indo-US Science and Technology Forum","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001429","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1049\/iet-com.2019.0005","type":"journal-article","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T02:40:38Z","timestamp":1560393638000},"page":"2261-2272","source":"Crossref","is-referenced-by-count":3,"title":["Defense against unknown broadband jammer for time\u2010critical operation in smart grid"],"prefix":"10.1049","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8548-7094","authenticated-orcid":false,"given":"Saptarshi","family":"Ghosh","sequence":"first","affiliation":[{"name":"Department of Electrical EngineeringIndian Institute of Technology DelhiHauz KhasNew Delhi110 016India"}]},{"given":"Manav R.","family":"Bhatnagar","sequence":"additional","affiliation":[{"name":"Department of Electrical EngineeringIndian Institute of Technology DelhiHauz KhasNew Delhi110 016India"}]},{"given":"Bijaya K.","family":"Panigrahi","sequence":"additional","affiliation":[{"name":"Department of Electrical EngineeringIndian Institute of Technology DelhiHauz KhasNew Delhi110 016India"}]}],"member":"265","published-online":{"date-parts":[[2019,9]]},"reference":[{"key":"e_1_2_9_2_1","unstructured":"IEC 61850: \u2018IEC Standard for Communication Network and Systems in Substations\u2019 2003\u201304 1st edn."},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","first-page":"3603","DOI":"10.1109\/ACCESS.2016.2636239","article-title":"Physical layer security jamming: theoretical limits and practical designs in wireless networks","volume":"5","author":"Cumanan K.","year":"2017","journal-title":"IEEE Access"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2713807"},{"issue":"1","key":"e_1_2_9_6_1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MWC.2017.1700015","article-title":"Jamming strategies for physical layer security","volume":"25","author":"Huo Y.","year":"2018","journal-title":"IEEE Wirel. Commun."},{"issue":"8","key":"e_1_2_9_7_1","doi-asserted-by":"crossref","first-page":"5314","DOI":"10.1109\/TWC.2018.2841921","article-title":"Game theory\u2010based anti\u2010jamming strategies for frequency hopping wireless communications","volume":"17","author":"Gao Y.","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2506038"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2728659"},{"issue":"9","key":"e_1_2_9_10_1","doi-asserted-by":"crossref","first-page":"2247","DOI":"10.1109\/TMC.2015.2492556","article-title":"Joint adaptation of frequency hopping and transmission rate for anti\u2010jamming wireless systems","volume":"15","author":"Hanawal M.K.","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399304"},{"key":"e_1_2_9_12_1","doi-asserted-by":"crossref","unstructured":"LiuY. NingP.: \u2018BitTrickle: defending against broadband and high\u2010power reactive jamming attacks\u2019. Proc. IEEE INFOCOM Orlando FL USA March2012 pp.909\u2013917","DOI":"10.1109\/INFCOM.2012.6195840"},{"issue":"4","key":"e_1_2_9_13_1","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TCOMM.2012.021712.100018","article-title":"CSI usage over parallel fading channels under jamming attacks: a game theory study","volume":"60","author":"Wei S.","year":"2012","journal-title":"IEEE Trans. Commun."},{"key":"e_1_2_9_14_1","doi-asserted-by":"crossref","unstructured":"BanawanK. UlukusS. WangP.et al.: \u2018Multiband jamming strategies with minimum rate constraints\u2019. Proc. IEEE Wireless Communications and Networking Conf. (WCNC) Doha 2016 pp.1\u20136","DOI":"10.1109\/WCNCW.2016.7552743"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.146"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2672682"},{"key":"e_1_2_9_17_1","unstructured":"LiL. LangbortC. ShammaJ.S.: \u2018An LP approach for solving two\u2010player zero\u2010sum repeated bayesian games\u2019 2007 arXiv:1703.01957v2"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.010411.100838"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2011.2160994"},{"issue":"3","key":"e_1_2_9_20_1","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/TII.2012.2223225","article-title":"A comprehensive investigation of wireless LAN for IEC 61850\u2010based smart distribution substation applications","volume":"9","author":"Parikh P.P.","year":"2013","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_9_21_1","doi-asserted-by":"crossref","unstructured":"GhoshS. BhatnagarM.R. PanigrahiB.K.: \u2018Non\u2010cooperative game based defense against broadband jammer in time\u2010critical wireless applications\u2019. Proc. IEEE SmartGridComm Sydney NSW November2016 pp.154\u2013159","DOI":"10.1109\/SmartGridComm.2016.7778754"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2577686"},{"key":"e_1_2_9_23_1","doi-asserted-by":"crossref","unstructured":"KarupongsiriC. MunasingheK.S. JamalipourA.: \u2018A novel communication mechanism for smart meter packet transmission on LTE networks\u2019. Proc. IEEE SmartGridComm Sydney NSW 2016 pp.122\u2013127","DOI":"10.1109\/SmartGridComm.2016.7778749"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2007.903219"},{"key":"e_1_2_9_25_1","doi-asserted-by":"crossref","unstructured":"SydneyK.M. DuC. NgwiraS.M.: \u2018The feasibility of a WLAN based power substation monitoring platform\u2019. Proc. Int. Conf. on Advances in Computing and Communication Engineering (ICACCE) Durban 2016 pp.85\u201390","DOI":"10.1109\/ICACCE.2016.8073728"},{"key":"e_1_2_9_26_1","unstructured":"ChoiM. ChoiJ. ParkJ.et al.: \u2018State estimation with delayed measurements considering uncertainty of time delay\u2019. Proc. IEEE Int. Conf. Robotics and Automation Kobe 2009 pp.3987\u20133992"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.oep.a041751"},{"key":"e_1_2_9_28_1","unstructured":"DuffM.: \u2018Optimal learning: Computational procedures for Bayes\u2010adaptive Markov decision processes\u2019. PhD dissertation University of Massachusetts 2002"},{"key":"e_1_2_9_29_1","unstructured":"DeardenR. FriedmanN. AndreD.: \u2018Model based Bayesian exploration\u2019. Proc. Uncertainty in Artificial Intelligence (UAI) Stockholm Sweden August1999 pp.150\u2013159"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976699300016070"},{"key":"e_1_2_9_31_1","unstructured":"KoenigS. SimmonsR.G.: \u2018Complexity analysis of real\u2010time reinforcement learning\u2019. Proc. Eleventh National Conf. on AI Washington DC USA 1993 pp.99\u2013105"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2019.0005","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-com.2019.0005","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2019.0005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T09:27:37Z","timestamp":1610616457000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-com.2019.0005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":31,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["10.1049\/iet-com.2019.0005"],"URL":"https:\/\/doi.org\/10.1049\/iet-com.2019.0005","archive":["Portico"],"relation":{},"ISSN":["1751-8636","1751-8636"],"issn-type":[{"value":"1751-8636","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}