{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:17:21Z","timestamp":1777043841689,"version":"3.51.4"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491080","type":"print"},{"value":"9783319491097","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_19","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"197-208","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVM"],"prefix":"10.1007","author":[{"given":"Zhipeng","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"19_CR1","unstructured":"Song Lijun,Li Nayuan,Wang Aixin. An Improved Security Protocol for Wireless Sensor Network Routing[J].Chinese Journl of Senors and Actuators, 2009, 10: 1471-1475"},{"key":"19_CR2","unstructured":"Yang Libing,Mu Dejun,Cai Xiaoyan.Study on intrusion detection for wireless sensor network[J]. Application Research of Computers, 2008, 11: 3204-3209"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Visual analytics for intrusion detection in spam emails Jinson Zhang; Mao Lin Huang; Doan Hoang DOI: http:\/\/dx.doi.org\/10.1504\/IJGUC.2013.056254 187-196","DOI":"10.1504\/IJGUC.2013.056254"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"A study on network security monitoring for the hybrid classification-based intrusion prevention systems Oscar Rodas; Marco Antonio To DOI: 10.1504\/IJSSC.2015.069240","DOI":"10.1504\/IJSSC.2015.069240"},{"key":"19_CR5","unstructured":"Hu Zhipeng,Wei Lixian,Shen JunWei,Yang Xiaoyuan. An Intrusion Detection Algorithm for WSN Based on Kernel Fisher Discriminant[J]. Chinese Journal of Sensors and Actuators. 2012.7: 1189-1193"},{"key":"19_CR6","doi-asserted-by":"publisher","unstructured":"Use of wireless sensor networks for distributed event detection in disaster management applications Majid Bahrepour; Nirvana Meratnia; Mannes Poel; Zahra Taghikhaki; Paul J.M. Havinga DOI: 10.1504\/IJSSC.2012.045569","DOI":"10.1504\/IJSSC.2012.045569"},{"key":"19_CR7","unstructured":"Zhu Qi,Song Rushun,Yao Yongxian. SVM-based cooperation intrusion detection system for WSN[J]. Application Research of Computers,2010,\u00a027(4):1489-1492"},{"key":"19_CR8","doi-asserted-by":"publisher","unstructured":"Decentralised malicious node detection in WSN Alaa Atassi; Naoum Sayegh; Imad H. Elhajj; Ali Chehab; Ayman Kayssi DOI: 10.1504\/IJSSC.2014.060685","DOI":"10.1504\/IJSSC.2014.060685"},{"key":"19_CR9","doi-asserted-by":"publisher","unstructured":"An effective attack detection approach in wireless mesh networks Felipe Barbosa Abreu; Anderson Morais; Ana Cavalli; Bachar Wehbi; Edgardo Montes de Oca; Wissam Mallouli DOI: 10.1504\/IJSSC.2015.069204100-114","DOI":"10.1504\/IJSSC.2015.069204100-114"},{"key":"19_CR10","unstructured":"The Network Simulator-NS2[EB\/OL]. http:\/\/www.isi.edu\/nsnam\/ns , 2006-09-17"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Downard I. Simulating Sensor Networks in NS2. Technical Report[R]. NRL\/FR\/5522-04 - 10073, Naval Research Laboratory, Washingt on, D. C.,U. S. A., May 2004.","DOI":"10.21236\/ADA423595"},{"key":"19_CR12","unstructured":"Yan K Q, Wang S C, Liu C W. A Hybrid Intrusion Detection System of Cluster-Based Wireless Sensor Networks[C]. Proceedings of the International Multi Conference of Engineers and Computer Scientists, 2009I: 956-963"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Heinzelman W B, Chndrakasan A P, Balakrishnan H. An Application-Specific Protocol Architecture for Wireless Micro sensor Networks[C]. IEEE Transaction on Wireless Communications, 2002, 1(4): 660-670.","DOI":"10.1109\/TWC.2002.804190"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:00:22Z","timestamp":1568484022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_19","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}