{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:41:17Z","timestamp":1725806477816},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/lcn.2017.110","type":"proceedings-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T21:53:21Z","timestamp":1510869201000},"page":"444-452","source":"Crossref","is-referenced-by-count":6,"title":["Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited"],"prefix":"10.1109","author":[{"given":"Lars","family":"Almon","sequence":"first","affiliation":[]},{"given":"Michael","family":"Riecker","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13651-1_24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644040"},{"journal-title":"INFOCOM","article-title":"Does wireless sensor network scale? A measurement study on greenorbs","year":"2011","author":"liu","key":"ref13"},{"journal-title":"IPSN","article-title":"Is there light at the ends of the tunnel? wireless sensor networks for adaptive lighting in road tunnels","year":"2011","author":"ceriotti","key":"ref14"},{"journal-title":"Interconnecting Smart Objects with IP The next Internet","year":"2010","author":"vasseur","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180351"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426670"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195801"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925784"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2012.6502525"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918964"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13651-1_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_17"},{"journal-title":"Proceedings of the International Symposium on Information Theory","article-title":"Information theory and an extension of the maximum likelihood principle","year":"1972","author":"akaike","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511753831"},{"journal-title":"Angewandte Statistik","year":"2006","author":"sachs","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983433"}],"event":{"name":"2017 IEEE 42nd Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2017,10,9]]},"location":"Singapore","end":{"date-parts":[[2017,10,12]]}},"container-title":["2017 IEEE 42nd Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8108703\/8109306\/08109386.pdf?arnumber=8109386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:51:44Z","timestamp":1516056704000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8109386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":23,"URL":"http:\/\/dx.doi.org\/10.1109\/lcn.2017.110","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}