{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:22:41Z","timestamp":1742383361976,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642258664"},{"type":"electronic","value":"9783642258671"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25867-1_18","type":"book-chapter","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T03:04:26Z","timestamp":1326164666000},"page":"189-199","source":"Crossref","is-referenced-by-count":4,"title":["Attack Detection vs. Privacy \u2013 How to Find the Link or How to Hide It?"],"prefix":"10.1007","author":[{"given":"Ji\u0159\u00ed","family":"K\u016fr","sequence":"first","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]},{"given":"Andriy","family":"Stetsko","sequence":"additional","affiliation":[]},{"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Biswas, S., Mukherjee, S., Mukhopadhyaya, K.: A countermeasure against traffic-analysis based base station detection in WSN. In: Web Proceedings of the International Conference on High Performance Computing, HiPC 2007 Posters, poster session (2007)"},{"key":"18_CR2","first-page":"637","volume-title":"DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks","author":"J. Deng","year":"2004","unstructured":"Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 637\u2013646. IEEE Computer Society, Washington, DC, USA (2004)"},{"key":"18_CR3","unstructured":"Hong, X., Wang, P., Kong, J., Zheng, Q., Liu, J.: Effective probabilistic approach protecting sensor traffic. In: IEEE Military Communications Conference, MILCOM 2005, vol.\u00a01, pp. 169\u2013175 (October 2005)"},{"key":"18_CR4","unstructured":"Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference (2007)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113\u2013127 (2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 1937\u20131945 (2007)","DOI":"10.1109\/INFCOM.2007.225"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1504\/IJSNET.2006.010834","volume":"1","author":"S. Misra","year":"2006","unstructured":"Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks\u00a01(1), 50\u201363 (2006)","journal-title":"International Journal of Sensor Networks"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, pp. 253\u2013259 (2005)","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"18_CR9","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/1029102.1029117","volume-title":"SASN 2004: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"C. Ozturk","year":"2004","unstructured":"Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: SASN 2004: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88\u201393. ACM, New York (2004)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Stetsko, A., Folkman, L., Matyas, V.: Neighbor-based intrusion detection for wireless sensor networks. Technical Report FIMU-RS-2010-04, Faculty of Informatics, Masaryk University (May 2010)","DOI":"10.1109\/ICWMC.2010.61"},{"key":"18_CR11","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proceedings of IEEE Symposium on Security and Privacy, 1997, pp. 44\u201354 (May 1997)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XIX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25867-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T17:10:56Z","timestamp":1742317856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25867-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642258664","9783642258671"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25867-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}