{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:49:12Z","timestamp":1742802552729},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_41","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T06:33:13Z","timestamp":1477031593000},"page":"419-428","source":"Crossref","is-referenced-by-count":3,"title":["An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids"],"prefix":"10.1007","author":[{"given":"Gunee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yun-Sam","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jungmin","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice, In the Fourth Edition, Springer-Verlag (1997)","DOI":"10.1007\/978-3-7091-3297-5"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"L. Hu and D. Evans, Localization for Mobile Sensor Networks, In Proc. of ACM MOBICOM, pp. 45-57 (2004)","DOI":"10.1145\/1023720.1023726"},{"key":"41_CR3","unstructured":"D. Liu, P. Ning, and W. Du, Detecting Malicious Beacon Nodes for Secure Location Discovery inWireless Sensor Networks, In Proc. of the 25th International Conference on Distributed Computer Systems (ICDCS), pp. 609-619 (2005)"},{"key":"41_CR4","unstructured":"W. Du, L. Fang, P. Ning, LAD: Localization Anomaly Detection for Wireless Sensor Networks, In the Journal of Parallel and Distributed Computing (JPDC), Vol. 66, No. 7, pp. 874-886 (2006)"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"N. Sastry, U. Shankar, and D.Wagner, Secure verification of location claims, In Proc. of ACM Workshop on Wireless Security (WiSe), pp. 1-10 (2003)","DOI":"10.1145\/941311.941313"},{"key":"41_CR6","unstructured":"C. H. Romesburg, Cluster Analysis for Researchers, (2004)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:06:47Z","timestamp":1568484407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_41","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}