{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:15:08Z","timestamp":1743081308908,"version":"3.40.3"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270715"},{"type":"electronic","value":"9783319270722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27072-2_26","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:40:18Z","timestamp":1451374818000},"page":"204-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard"],"prefix":"10.1007","author":[{"given":"Mitko","family":"Bogdanoski","sequence":"first","affiliation":[]},{"given":"Pero","family":"Latkoski","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Risteski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"issue":"24","key":"26_CR1","first-page":"59","volume":"13","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59\u201373 (2013)","journal-title":"Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J."},{"key":"26_CR2","unstructured":"Cisco Systems, Inc., Cisco Wireless Control System Configuration Guide, Software Re- lease 7.0.172.0 (2011)"},{"key":"26_CR3","unstructured":"IEEE Standard for Information Technology \u2013 Telecommunications and information exchange between systems \u2013 Local and metropolitan area networks \u2013 Specific requirements. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 4: Protected Management Frames. IEEE Std. 802.11w-2009 (2009)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Liu C., Yu J., Brewster G.: Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs. In: IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, Canada (2010)","DOI":"10.1109\/WOWMOM.2010.5534920"},{"key":"26_CR5","first-page":"31","volume":"34","author":"C Liu","year":"2007","unstructured":"Liu, C., Yu, J.: A solution to WLAN authentication and association DoS attacks. IAENG Int. J. Comput. Sci. 34, 31 (2007)","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"26_CR6","unstructured":"Liu, C., Yu, J.: Detail derivations of Tr, Ta, t2, and t5 (2009)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27072-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:25:51Z","timestamp":1559355951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27072-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319270715","9783319270722"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27072-2_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}