{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:28:37Z","timestamp":1737523717524,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76837-1_42","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T10:25:50Z","timestamp":1194344750000},"page":"382-391","source":"Crossref","is-referenced-by-count":4,"title":["Selfish MAC Layer Misbehavior Detection Model for the IEEE 802.11-Based Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"Hongjian","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Guang, L., Assi, C.: Modeling and Analysis of Predictable Random Backoff in Selfish Environment. In: MSWiM 2006, Terromolinos, Malaga Spain, October 2\u20136, 2006, pp. 86\u201390 (2006)","DOI":"10.1145\/1164717.1164733"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Guang, L., Assi, C.: Mitigating smart selfish MAC misbehavior in ad hoc networks. In: Proc. IEEE WiMob (June 2006)","DOI":"10.1109\/WIMOB.2006.1696387"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: Proc. 2003 Int\u2019l Conf. Dependable Systems and Networks, pp. 173\u2013182 (2003)","DOI":"10.1109\/DSN.2003.1209928"},{"issue":"4","key":"42_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","volume":"7","author":"D. Djenouri","year":"2005","unstructured":"Djenouri, D., Khelladi, L., Badache, A.N.: A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, Communications Surveys & Tutorials, IEEE, Vol. Communications Surveys & Tutorials\u00a07(4), 2\u201328 (2005)","journal-title":"Communications Surveys & Tutorials"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing (September 2005)","DOI":"10.1109\/TMC.2005.71"},{"key":"42_CR6","unstructured":"Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, In: Proc. USENIX Security Symp., Washington DC, pp. 15\u201328 (August 2003)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer misbehavior in wireless networks. In: Proc. Int. Conf. Dependable Systems and Networks, San Francisco, CA, pp. 173\u2013182 (June 2003)","DOI":"10.1109\/DSN.2003.1209928"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J.-P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proc. MobiSys, Boston, MA, pp. 84\u201397 (June 2004)","DOI":"10.1145\/990064.990077"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On selfish behavior in CSMA\/CA networks. In: Proc. IEEE INFOCOM 2005, Miami, FL, pp. 1514\u20132513 (March 2005)","DOI":"10.1109\/INFCOM.2005.1498536"},{"key":"42_CR10","series-title":"Lecture Notes in Computer Science","first-page":"33","volume-title":"Web Information Systems Engineering \u2013 WISE 2005","author":"S. Radosavac","year":"2005","unstructured":"Radosavac, S., Baras, J.S.: A Framework for MAC Protocol Misbehavior Detection in Wireless Networks. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, J.-Y., Sheng, Q.Z. (eds.) WISE 2005. LNCS, vol.\u00a03806, pp. 33\u201342. Springer, Heidelberg (2005)"},{"issue":"6","key":"42_CR11","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TNET.2006.886298","volume":"14","author":"J. Konorski","year":"2006","unstructured":"Konorski, J.: A Game-Theoretic Study of CSMA\/CA Under a Backoff Attack. IEEE\/ACM Transactions on Networking\u00a014(6), 1167\u20131177 (2006)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom (September 2004)","DOI":"10.1145\/1023720.1023741"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, V., Krishnamurthy, S., Faloutsous, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: Proc. of MILCOM (2002)","DOI":"10.1109\/MILCOM.2002.1179634"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76837-1_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:40:56Z","timestamp":1737517256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76837-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768364"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76837-1_42","relation":{},"subject":[]}}