{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:40:45Z","timestamp":1770295245177,"version":"3.49.0"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030322571","type":"print"},{"value":"9783030322588","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_41","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"350-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning"],"prefix":"10.1007","author":[{"given":"Anastasia","family":"Balueva","sequence":"first","affiliation":[]},{"given":"Vasily","family":"Desnitsky","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Ushakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"issue":"48","key":"41_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.15622\/sp.48.1","volume":"5","author":"Vasily Alekseevich Desnitsky","year":"2016","unstructured":"Desnitsky, V., Chechulin, A., Kotenko, I., Levshun, D., Kolomeec, M.: Combined design technique for secure embedded devices exemplified by a perimeter protection system. In: SPIIRAS Proceedings, no. 48, pp. 5\u201331 (2016)","journal-title":"SPIIRAS Proceedings"},{"issue":"2","key":"41_CR2","doi-asserted-by":"crossref","first-page":"419","DOI":"10.24297\/ijct.v4i2b1.3230","volume":"4","author":"S Kaur","year":"2013","unstructured":"Kaur, S., Ataullah, Md, Garg, M.: Security from denial of sleep attack in wireless sensor network. Int. J. Comput. Technol. 4(2), 419\u2013425 (2013)","journal-title":"Int. J. Comput. Technol."},{"issue":"2","key":"41_CR3","first-page":"195","volume":"3","author":"M Wainis","year":"2014","unstructured":"Wainis, M., Kabalan, K., Dandeh, R.: Denial of sleep detection and mitigation. Latest Trends Commun. 3(2), 195\u2013200 (2014)","journal-title":"Latest Trends Commun."},{"key":"41_CR4","unstructured":"Kaur, S., Ataullah, Md.: Securing wireless sensor network from denial of sleep attack by isolating nodes. Int. J. Comput. Appl. Technol. 103(1), 29\u201333 (2014)"},{"key":"41_CR5","unstructured":"Raymond, D.R.: Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Engineering (2008)"},{"key":"41_CR6","doi-asserted-by":"publisher","unstructured":"Desnitsky, V.A., Kotenko, I.V., Rudavin, N.N.: Protection mechanisms against energy depletion attacks in cyber-physical systems. In: Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus 2019), pp. 214\u2013219 (2019). https:\/\/doi.org\/10.1109\/EIConRus.2019.8656795","DOI":"10.1109\/EIConRus.2019.8656795"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,8]],"date-time":"2019-12-08T13:06:14Z","timestamp":1575810374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_41","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}