{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:21:49Z","timestamp":1725564109601},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_15","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"100-107","source":"Crossref","is-referenced-by-count":1,"title":["Design and Analysis of Specification Based Ids for Wireless Networks Using Soft Computing"],"prefix":"10.1007","author":[{"given":"Vydeki","family":"Dharmar","sequence":"first","affiliation":[]},{"given":"K.","family":"Jayanthy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Karlof, C., Wagner, D.: Summary of Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures (April 27, 2005), Maarit.Hietalahti@hut.fi"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ramanujan, R., Kudige, S., Nguyen, T., Takkella, S., Adelstein, F.: Intrusion-Resistant Ad Hoc Wireless Networks. In: Proceedings of MILCOM 2002 (October 2002)","DOI":"10.1109\/MILCOM.2002.1179592"},{"issue":"2-3","key":"15_CR3","first-page":"293","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and Counter measures. Elsevier\u2019s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols\u00a01(2-3), 293\u2013315 (2003)","journal-title":"Elsevier\u2019s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/S0165-0114(02)00110-0","volume":"131","author":"H. Sun","year":"2002","unstructured":"Sun, H., Liu, L.: A linear output structure for fuzzy logic controllers. Fuzzy Sets and System\u00a0131(2), 265\u2013270 (2002)","journal-title":"Fuzzy Sets and System"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/3477.979967","volume":"32","author":"F.H. Hsiao","year":"2002","unstructured":"Hsiao, F.H., Hwang, J.D.: Stability analysis of fuzzy large-scale systems. IEEE Trans. System, Man, Cybern. B, Cybern.\u00a032(1), 122\u2013126 (2002)","journal-title":"IEEE Trans. System, Man, Cybern. B, Cybern."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. In: 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31 (2003)","DOI":"10.1145\/948109.948118"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:40:00Z","timestamp":1606185600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}