{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:33:15Z","timestamp":1725532395341},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013980"},{"type":"electronic","value":"9783642013997"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01399-7_50","type":"book-chapter","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T01:18:41Z","timestamp":1241572721000},"page":"639-650","source":"Crossref","is-referenced-by-count":8,"title":["Impact of Misbehaviour on QoS in Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"Szymon","family":"Szott","sequence":"first","affiliation":[]},{"given":"Marek","family":"Natkaniec","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Banchs","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), pp. C1\u20131184 (2007)"},{"key":"50_CR2","unstructured":"IEEE, 802.11 TGs Mesh Networking IEEE, Protocol Proposal IEEE P802.11s\/D1.07 (2007)"},{"key":"50_CR3","unstructured":"MADWiFi \u2013 Multiband Atheros Driver for WiFi, http:\/\/madwifi-project.org"},{"key":"50_CR4","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE ICNP (International Conference on Network Protocols) 2001, Riverside (2001)"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes \u2013 Fairness In Dynamic Ad-Hoc Networks. In: Proc. IEEE\/ACM Symp. Mobile Ad Hoc Net. and Comp., Lausanne, Switzerland (2002)","DOI":"10.1145\/513824.513828"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security 2002, Portoroz, Slovenia (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Kyasanur, P., Vaidya, N.H.: Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In: International Conference on Dependable Systems and Networks (DSN 2003), p. 173 (2003)","DOI":"10.1109\/DSN.2003.1209928"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the 2nd international Conference on Mobile Systems, Applications, and Services (MobiSys 2004), Boston, MA, USA (2004)","DOI":"10.1145\/990064.990077"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Serrano, P., Banchs, A., Kukielka, J.F.: Detection of malicious parameter configurations in 802.11e EDCA. In: Global Telecommunications Conference 2005 (2005)","DOI":"10.1109\/GLOCOM.2005.1578384"},{"key":"50_CR10","unstructured":"Wieth\u00f6lter, S., Emmelmann, M., Hoene, C., Wolisz, A.: TKN EDCA Model for ns-2, Technical Report TKN-06-003, Telecommunication Networks Group, Technische Universit\u00e4t Berlin (2006)"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Szott, S., Natkaniec, M., Canonico, R., Pach, A.R.: Impact of Contention Window Cheating on Single-hop IEEE 802.11e MANETs. In: IEEE Wireless Communications and Networking Conference (WCNC 2008), Las Vegas (2008)","DOI":"10.1109\/WCNC.2008.244"},{"issue":"4","key":"50_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MNET.2005.1470683","volume":"19","author":"A. Banchs","year":"2005","unstructured":"Banchs, A., Azcorra, A., Garc\u00eda, C., Cuevas, R.: Applications and Challenges of the 802.11e EDCA Mechanism: An Experimental Study. IEEE Network\u00a019(4), 52\u201358 (2005)","journal-title":"IEEE Network"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Qiu, L., Bahl, P., Rao, A., Zhou, L.: Troubleshooting wireless mesh networks. SIGCOMM Comput. Commun.\u00a036(5) (October 2006)","DOI":"10.1145\/1163593.1163597"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01399-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:52:46Z","timestamp":1558288366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01399-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013980","9783642013997"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01399-7_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}