{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:15:17Z","timestamp":1725498917020},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540774433"},{"type":"electronic","value":"9783540774440"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77444-0_35","type":"book-chapter","created":{"date-parts":[[2007,12,19]],"date-time":"2007-12-19T08:57:09Z","timestamp":1198054629000},"page":"339-344","source":"Crossref","is-referenced-by-count":6,"title":["Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Partha","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Sandip","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1029102.1029115","volume-title":"SASN 2004. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","author":"S. Ganeriwal","year":"2004","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: SASN 2004. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 66\u201377. ACM Press, New York (2004)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41\u201347 (November 2002)","DOI":"10.1145\/586110.586117"},{"issue":"5","key":"35_CR3","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw.\u00a08(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Insens: Intrusion-tolerant routing in wireless sensor networks (2002)","DOI":"10.1007\/3-540-36978-3_23"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1145\/1132905.1132944","volume-title":"MobiHoc 2006. Proceedings of the 7th international symposium on Mobile ad hoc networking and computing","author":"Y. Yang","year":"2006","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: A secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006. Proceedings of the 7th international symposium on Mobile ad hoc networking and computing, pp. 356\u2013367. ACM Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77444-0_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:12:31Z","timestamp":1619521951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77444-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774433","9783540774440"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77444-0_35","relation":{},"subject":[]}}