{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:12:30Z","timestamp":1725549150460},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642118418"},{"type":"electronic","value":"9783642118425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11842-5_28","type":"book-chapter","created":{"date-parts":[[2010,3,5]],"date-time":"2010-03-05T12:12:15Z","timestamp":1267791135000},"page":"212-217","source":"Crossref","is-referenced-by-count":7,"title":["Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture"],"prefix":"10.1007","author":[{"given":"Surraya","family":"Khanum","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Rehab","family":"Zafar","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Sher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Kalantzis, S.: Security Models for Wireless Sensor Networks (2006)","key":"28_CR1"},{"key":"28_CR2","volume-title":"Wireless Sensor Networks: Applications and Chalenges","author":"A. Alemdar","year":"2007","unstructured":"Alemdar, A., Ibnkahla, M.: Wireless Sensor Networks: Applications and Chalenges. IEEE, Los Alamitos (2007)"},{"unstructured":"Sun, B., Osborne, L.: Intrusion Detection Techniques In Mobile Ad Hoc And Wireless Sensor networks, The University of Alabama Sghaier Guizani, University of Quebec at Trois-Rivieres","key":"28_CR3"},{"key":"28_CR4","volume-title":"A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks","author":"R.-C. Chen","year":"2009","unstructured":"Chen, R.-C., Hsieh, C.-F., Huang, Y.-F.: A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks. ACM, New York (2009)"},{"unstructured":"Huai-bin, W., Zheng, Y., Chun-dong, W.: International Conference on Communications and Mobile Computing Intrusion Detection for Wireless Sensor Networks Based on Multi-Agent and Refined Clustering. In: IEEE International Conference on Communications and Mobile Computing (2009)","key":"28_CR5"},{"doi-asserted-by":"crossref","unstructured":"Ngai, E., Liu, J., Lyu, M.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: IEEE International Conference on Communications, ICC 2006 (2006)","key":"28_CR6","DOI":"10.1109\/ICC.2006.255595"},{"unstructured":"Ioannis, K., Dimitriou, T., Freiling, F.: Towards Intrusion Detection in Wireless Sensor Networks. In: 13th European Wireless Conference (2007)","key":"28_CR7"},{"unstructured":"Ren, Q., Liang, Q.: Secure Media Access Control (MAC) in wireless sensor networks: intrusion Detections and Countermeasures. In: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2004)","key":"28_CR8"},{"doi-asserted-by":"crossref","unstructured":"Lewis, F., Cook, D.J., Das, S.K., John, W.: Wireless Sensor Networks Smart Environments Technologies (2004)","key":"28_CR9","DOI":"10.1002\/047168659X.ch2"},{"key":"28_CR10","volume-title":"ISSNIP","author":"Y. Wei","year":"2005","unstructured":"Wei, Y., Paul, L., Havinga, J.M.: How to Secure a Wireless Sensor Network. In: ISSNIP. IEEE, Los Alamitos (2005)"},{"key":"28_CR11","volume-title":"International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing","author":"Z. Yu","year":"2008","unstructured":"Yu, Z.: A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks. In: International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, Los Alamitos (2008)"},{"unstructured":"Kuldeep, K., Sharma Ghose, M.K.: Wireless Sensor Networks Security: A New Approach, Computer Science and Engineering Department, Sikkim Manipal Institute of Technology, India","key":"28_CR12"},{"key":"28_CR13","volume-title":"Minimizing the Intrusion Detection Modules in Wireless Sensor Networks","author":"T.H. Hai","year":"2008","unstructured":"Hai, T.H., Huh, E.-N.: Minimizing the Intrusion Detection Modules in Wireless Sensor Networks. IEEE, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11842-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T13:27:22Z","timestamp":1558877242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11842-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642118418","9783642118425"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11842-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}